The magnitude of the harm expected as a result of the consequences of an unauthorized disclosure, modification, destruction or loss of information is known as
Correct Answer:
C
What does the term business in business continuity planning refer to?
Correct Answer:
C
What is the main purpose of using multi-factor authentication (MFA) in a security system?
Correct Answer:
D
A company primary data center goes down due to a hardware failure causing a major disruption to the IT and communications systems. What is the focus of disaster recovery planning in this scenario
Correct Answer:
C
Which of the following attacks can TLS help mitigate?
Correct Answer:
C