Which attack category targets the confidentiality of data?
A. Interruption
B. Modification
C. Interception
D. Fabrication
Answer: C. Interception
Computer Science & Information Technology
You might also like to view...
Both Excel and Access can be used to create charts
Indicate whether the statement is true or false
Computer Science & Information Technology
What security principle limits access to services to only those needed, keeping all other ports closed?
What will be an ideal response?
Computer Science & Information Technology
When preparing training materials, trainers should respect copyrighted materials and avoid copying verbatim from a single source.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Which of the following is not a valid NIC teaming mode?
A. Link Aggregation Control Protocol B. Static C. Dynamic D. Switch Independent
Computer Science & Information Technology