In information security, what can constitute a loss?

A. theft of information
B. a delay in transmitting information that results in a financial penalty
C. the loss of good will or a reputation
D. all of the above


Answer: D

Computer Science & Information Technology

You might also like to view...

What must you do before adding a primitive type to a vector?

What will be an ideal response?

Computer Science & Information Technology

On a(n) ______ tablet, the case is positioned below a keyboard, attached by a hinge that enables the user to fold the display down over the keyboard.

A. convertible B. ultrathin C. collapsible D. all-in-one

Computer Science & Information Technology

A firewall technician has been instructed to disable all non-secure ports on a corporate firewall. The technician has blocked traffic on port 21, 69, 80, and 137-139. The technician has allowed traffic on ports 22 and 443. Which of the following correctly lists the protocols blocked and allowed?

A. Blocked: TFTP, HTTP, NetBIOS; Allowed: HTTPS, FTP B. Blocked: FTP, TFTP, HTTP, NetBIOS; Allowed: SFTP, SSH, SCP, HTTPS C. Blocked: SFTP, TFTP, HTTP, NetBIOS; Allowed: SSH, SCP, HTTPS D. Blocked: FTP, HTTP, HTTPS; Allowed: SFTP, SSH, SCP, NetBIOS

Computer Science & Information Technology

To cloak a particular file type, you should open the Site Definition dialog box, click the Cloaking category, click the Cloak files ending with check box, and then type a file extension in the text box below the check box.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology