in Education by
Possible threat to any information cannot be ________________ (a) reduced (b) transferred (c) protected (d) ignored The question was posed to me in exam. Question is from Information Security Technologies topic in section Cyber Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
The correct choice is (d) ignored Explanation: When there lies a threat to any system, safeguards can be implemented, outsourced, distributed or transferred to some other system, protected using security tools and techniques but cannot be ignored.

Related questions

0 votes
    From the options below, which of them is not a threat to information security? (a) Disaster (b) Eavesdropping (c ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Enumeration is done to gain information. Which of the following cannot be achieved using enumeration? (a) IP Tables ( ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    ________________ cryptography is based on publicly known mathematically designed algorithms to encrypt the information. ... :,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    ________________ are piece of programs or scripts that allow hackers to take control over any system. (a) Exploits (b ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    An attempt to harm, damage or cause threat to a system or network is broadly termed as ______ (a) Cyber-crime ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    TLS vulnerability is also known as Return of Bleichenbacher's Oracle Threat. (a) True (b) False The question was ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
0 votes
    The threat of backdoors started when ____________ & ____________ OSs became widely accepted. (a) single-user, ... -Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Which of the following is not a threat of web application? (a) Reverse engineering (b) Command injection ( ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Which of the following is not a threat of web application? (a) Session poisoning (b) Phishing (c) ... Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Whaling is the technique used to take deep and _________ information about any individual. (a) sensitive (b) powerful ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
...