InterviewSolution
Saved Bookmarks
| 1. |
Compromising confidential information comes under _________(a) Bug(b) Threat(c) Vulnerability(d) AttackI got this question in a national level competition.My enquiry is from Information Security Technologies in portion Cyber Security of Cyber Security |
|
Answer» The correct option is (b) Threat |
|