In which category does compromising confidential information fall?
Anonymous Quiz
50%
Threat
13%
Bug
11%
Russi is great
26%
Attack
Which software is mainly used to detect viruses and avoid them
Anonymous Quiz
5%
Antinal
9%
Anticipate
8%
Anthony
78%
Anti-virus
🤣2
👍1
A replay attack
Anonymous Quiz
76%
Makes a copy of the transmission for use it later
11%
Can be in real life
6%
Can can a can but the can can not can it
6%
None
🤣2
To detect something unusual
Anonymous Quiz
58%
Scanning
23%
Phishing
17%
Sharking
2%
Baby shark du du du du
🤣4
Computer security is protection of the integrity availability and confidentiality of information system resources
Anonymous Quiz
94%
T
6%
F
Malicious software can be used to trick users into revealing sensitive personal data
Anonymous Quiz
89%
T
11%
F
Spyware is a general term used for describing software that gathers information without user's consent
Anonymous Quiz
88%
T
12%
F
👍1
Authorized parties can view information
Anonymous Quiz
71%
Confidentiality
17%
Integrity
9%
Scalability
3%
None
Using additive Caesar cipher with key=10 to encrypt "hello" we get "ROVVY"
Anonymous Quiz
85%
True
15%
False
Cryptography is the science and art of transforming messages to make them secure ammune to attack
Anonymous Quiz
90%
True
10%
False
a replay attack makes a copy of the transmission for use at a later time
Anonymous Quiz
98%
True
2%
False
threat agent is a person or thing that has the power to carry out a threat
Anonymous Quiz
89%
True
11%
False