A user has reported inadvertently sending an encrypted email containing PII to an incorrect distribution group. Which of the following potential incident types is this?
A. Data sharing
B. Unauthorized viewing
C. Data breach
D. Unauthorized access
Answer: B. Unauthorized viewing
You might also like to view...
Draw an FDD that shows the Personal Trainer’s main functions. Also draw a use case diagram that represents the interaction between a user and the proposed TIMS system.
What will be an ideal response?
What objects would you encounter in a clothing store?
What will be an ideal response?
According to temporal locality, processes are likely to reference pages that ________.
a) have been referenced recently b) are located at address near recently referenced pages in memory c) have been preloaded into memory d) none of the above
You are ________ when you decide to use your neighbor's open wireless network without their permission
A) hacking B) trolling C) wardriving D) piggybacking