COMPUTER THREATS SECURITY
COMPUTER SECURITY POLICIES EXAMPLES
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
Which of the following is considered a low-level incident?
|
Unfriendly employment termination
|
|
Illegal access to buildings
|
|
denial of service attacks
|
|
Unsuccessful scans and probes
|
Explanation:
Detailed explanation-1: -Basis approval, sharing access controlled Infosys process document with the Client manager are not security incidents.
Detailed explanation-2: -An occurrence that actually or imminently jeopardizes, without lawful authority, the confidentiality, integrity, or availability of information or an information system; or constitutes a violation or imminent threat of violation of law, security policies, security procedures, or acceptable use policies.
Detailed explanation-3: -Physical Theft. Physical theft is beyond the scope of a firewall’s protection. Your firewall won’t be of much help if a user attempts to access the data from your stolen computer.
There is 1 question to complete.