00:00

QUESTION 61

The magnitude of the harm expected as a result of the consequences of an unauthorized disclosure, modification, destruction or loss of information is known as

Correct Answer: C

QUESTION 62

What does the term business in business continuity planning refer to?

Correct Answer: C

QUESTION 63

What is the main purpose of using multi-factor authentication (MFA) in a security system?

Correct Answer: D

QUESTION 64

A company primary data center goes down due to a hardware failure causing a major disruption to the IT and communications systems. What is the focus of disaster recovery planning in this scenario

Correct Answer: C

QUESTION 65

Which of the following attacks can TLS help mitigate?

Correct Answer: C