FUNDAMENTALS OF COMPUTER

SYSTEMS DEVELOPMENT ANALYSIS

SYSTEMS DEVELOPMENT METHODS AND TOOLS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Possible threat to any information cannot be ____
A
reduced
B
transferred
C
protected
D
ignored
Explanation: 

Detailed explanation-1: -1 Answer. Explanation: When there lies a threat to any system, safeguards can be implemented, outsourced, distributed or transferred to some other system, protected using security tools and techniques but cannot be ignored.

Detailed explanation-2: -Information Security threats can be many like Software attacks, theft of intellectual property, identity theft, theft of equipment or information, sabotage, and information extortion.

Detailed explanation-3: -Possible threats to any information cannot be ignored as a piece of information is a delicate and can be misused in innumerous ways.

Detailed explanation-4: -Explanation: Disaster, eavesdropping and information leakage come under information security threats whereas not changing the default password of any system, hardware or any software comes under the category of vulnerabilities that the user may pose to its system.

There is 1 question to complete.