Which of the following threats involves outside parties using information to embarrass a company?

A) Accidental loss
B) Theft and fraud
C) Loss of confidentiality
D) Loss of data integrity


C) Loss of confidentiality

Computer Science & Information Technology

You might also like to view...

Pressing and holding [Shift] when rotating rotates the artwork in ____ degree increments.

A. 5 B. 10 C. 15 D. 20

Computer Science & Information Technology

Which wireless encryption standard is based on RC4 symmetric encryption and uses 64- or 128-bit encryption key?

a. WEP b. WPA c. WPA1 d. WPA2

Computer Science & Information Technology

If a computer is running extremely slowly, the performance monitor may determine that the computer's memory is being used to its maximum.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

DHCP assigns an IP address to a device and links it to the device's _______ address.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology