Shorty Quiz 01
Total 5 Points
Which of the following defines Vulnerability the best?
A protective measure
A weakness in the system
A potential negative harmful occurrence
None of the Above
Fabrication of data affects which aspect of information security?
Confidentiality
Integrity
Availability
Which of the following method is used to store passwords securely in database servers?
Encoding
Encryption
Hashing
Obfuscation
Which of the below listed item are not phishing attack?
Whaling
Spear Phishing
PreTexing
Shoulder Surfing
The mandatory process used to verify the identity of the user and restrict illegitimate users to access the system is called as_______
Authentication
Authorization
Auditing
None of the Above