FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

COMPUTER SECURITY POLICIES EXAMPLES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following is considered a low-level incident?
A
Unfriendly employment termination
B
Illegal access to buildings
C
denial of service attacks
D
Unsuccessful scans and probes
Explanation: 

Detailed explanation-1: -Basis approval, sharing access controlled Infosys process document with the Client manager are not security incidents.

Detailed explanation-2: -An occurrence that actually or imminently jeopardizes, without lawful authority, the confidentiality, integrity, or availability of information or an information system; or constitutes a violation or imminent threat of violation of law, security policies, security procedures, or acceptable use policies.

Detailed explanation-3: -Physical Theft. Physical theft is beyond the scope of a firewall’s protection. Your firewall won’t be of much help if a user attempts to access the data from your stolen computer.

There is 1 question to complete.