Recently, a hacker used a social engineering attack to discover the passwords of several users. Which security tenet was compromised as a result of this attack?

A. Confidentiality
B. Integrity
C. Availability
D. Authentication


A

Explanation: Confidentiality was compromised as a result of this attack. User passwords should be considered confidential information.

Computer Science & Information Technology

You might also like to view...

________ is/are used to copy a series of data based on a pattern into adjacent cells

A) A fill handle B) Cut and Paste C) Paste Special D) Copy and Paste

Computer Science & Information Technology

Consider the statement int list[10][8];. Which of the following about list is true?

A. list has 10 rows and 8 columns. B. list has 8 rows and 10 columns. C. list has a total of 18 components. D. list has a total of 108 components.

Computer Science & Information Technology

Which of the following is a mode of operation that includes EAP or RADIUS for centralized client authentication using multiple authentication methods, such as token cards, Kerberos, and certificates?

A. WPA3-Personal B. WPA2-Personal C. WPA3-Enterprise D. WPA2-Enterprise

Computer Science & Information Technology

Why is the audit trail necessary?

What will be an ideal response?

Computer Science & Information Technology