Which of the following threats involves outside parties using information to embarrass a company?
A) Accidental loss
B) Theft and fraud
C) Loss of confidentiality
D) Loss of data integrity
C) Loss of confidentiality
Computer Science & Information Technology
You might also like to view...
Pressing and holding [Shift] when rotating rotates the artwork in ____ degree increments.
A. 5 B. 10 C. 15 D. 20
Computer Science & Information Technology
Which wireless encryption standard is based on RC4 symmetric encryption and uses 64- or 128-bit encryption key?
a. WEP b. WPA c. WPA1 d. WPA2
Computer Science & Information Technology
If a computer is running extremely slowly, the performance monitor may determine that the computer's memory is being used to its maximum.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
DHCP assigns an IP address to a device and links it to the device's _______ address.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology