_______ means the protection of data from modification by unknown users
READ MORE +
_______ means the protection of data from modification by unknown users
READ MORE +
The CIA triad is often represented by which of the following?
READ MORE +
Compromising confidential information comes under _________
READ MORE +
_______ is the practice and precautions taken to protect valuable information from unauthorized access, recording, disclosure or destruction
READ MORE +
An attempt to harm, damage or cause threat to a system or network is broadly termed as ______
READ MORE +
_______ platforms are used for safety and protection of information in the cloud
READ MORE +
How to track Email?
READ MORE +
What are the types of password attacks?
READ MORE +
Which of the following is known as Malicious software?
READ MORE +
To protect a computer from virus, you should install ——– on your computer
READ MORE +
The first computer virus is ——–
READ MORE +
Which of the following is not done by cybercriminals?
READ MORE +