Computers and Technology

Which of the following attack is a threat to confidentiality?

a. snooping
b. masquerading
c. repudiation

answer
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 17:00, smartoa
Annie is creating a corporate report for a company’s annual meeting. in the report, she wants to add the signature of various department heads. which device can annie use to capture signatures to include in the report? a. printer b. monitor c. e-reader d. digitizing tablet
Answers: 1
image
Computers and Technology, 22.06.2019 19:00, alyssashae1818
Which parts of a presentation should be the most general? a. introduction and conclusion b. introduction and outline c. outline and conclusion d. outline and body
Answers: 1
image
Computers and Technology, 23.06.2019 01:30, bri2728
Jason works as an accountant in a department store. he needs to keep a daily record of all the invoices issued by the store. which file naming convention would him the most? a)give the file a unique name b)name the file in yymmdd format c)use descriptive name while naming the files d)use capital letters while naming the file
Answers: 3
image
Computers and Technology, 23.06.2019 06:00, jack487
How can a user delete a drawing object
Answers: 1
Do you know the correct answer?
Which of the following attack is a threat to confidentiality?

a. snooping
b. mas...

Questions in other subjects:

Konu
Mathematics, 03.02.2021 22:00
Konu
Mathematics, 03.02.2021 22:00
Konu
Mathematics, 03.02.2021 22:00
Konu
Mathematics, 03.02.2021 22:00