Which attack category targets the confidentiality of data?

A. Interruption
B. Modification
C. Interception
D. Fabrication


Answer: C. Interception

Computer Science & Information Technology

You might also like to view...

Both Excel and Access can be used to create charts

Indicate whether the statement is true or false

Computer Science & Information Technology

What security principle limits access to services to only those needed, keeping all other ports closed?

What will be an ideal response?

Computer Science & Information Technology

When preparing training materials, trainers should respect copyrighted materials and avoid copying verbatim from a single source.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is not a valid NIC teaming mode?

A. Link Aggregation Control Protocol B. Static C. Dynamic D. Switch Independent

Computer Science & Information Technology