Information Technology > QUESTIONS & ANSWERS > IT Security: Defense against the digital dark arts already passed (All)
IT Security: Defense against the digital dark arts already passed In the CIA Triad, "Confidentiality" means ensuring that data is: ✔✔not accessible by unwanted parties In the CIA Triad, "Integ... rity" means ensuring that data is: ✔✔accurate and wasn't tampered with In the CIA Triad, "Availability" means ensuring that data is: ✔✔available and people can access it What's the relationship between a vulnerability and an exploit? ✔✔An exploit takes an advantage of a vulnerability to run arbitrary code or gain access. Which statement is true for both a worm and a virus? ✔✔They are self-replicating and selfpropagatin Check all examples of types of malware: ✔✔Viruses Adware Worms What are the characteristics of a rootkit? Check all that apply. ✔✔Difficult to detect Provides elevated credentials [Show More]
Last updated: 1 year ago
Preview 1 out of 1 pages
Instant download
Buy this document to get the full access instantly
Instant Download Access after purchase
Add to cartInstant download
Connected school, study & course
About the document
Uploaded On
Oct 03, 2022
Number of pages
1
Written in
This document has been written for:
Uploaded
Oct 03, 2022
Downloads
0
Views
63
In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Browsegrades · High quality services·