A
Q. Compromising confidential information comes under _________
- Correct Answer - Option(B)
- Views: 415
- Filed under category Information Cyber Security
No solution found for this question.
Add Solution and get +2 points.
You must be Logged in to update hint/solution
Be the first to start discuss.
Related Posts
Q. When you use the word it means you are protecting your data from getting disclosed.
Q. In RSA, Ф(n) = in terms of p and q.
Q. Which of the following Algorithms not belong to symmetric encryption
Q. Stealing of digital files comes under __________ of the Indian IT Act.
Q. ________function creates a message digest out of a message.
Q. ______ provides authentication at the IP level.
Q. The information that gets transformed in encryption is
Q. According to the CIA Triad, which of the below-mentioned element is not considered in the triad?
View All Posts
Question analytics

Discusssion
Login to discuss.