Confidentiality - protecting information frombeing disclosed to unauthorized parties.InfoSec: C-I-A TriadIntegrity - protecting information from beingchanged by unauthorised parties.Availability - to the availability of information toauthorized parties only when requestedA virus is a program designed to interfere with yourcomputer, device or network’s normal operation. A virusattaches itself in a program or a file and like real-life viruses,computer viruses can multiply or make complete copies ofthemselves when you copy the program or file that it isattached to.1A worm is considered as type of virus. Like a virus, it canmake copies of itself in computers that it comes in contactwith.2. WormA Trojan Horse or simply a Trojan is a type of malware thatdisguises itself as a useful and/or harmless program or file.Unwanted email mostly from bots or advertisers. It can beused to send malware.4. SpamA program designed to send you advertisements, mostly aspop-ups - take the quiz
{"name":"Confidentiality - protecting information frombeing disclosed to unauthorized parties.InfoSec: C-I-A TriadIntegrity - protecting information from beingchanged by unauthorised parties.Availability - to the availability of information toauthorized parties only when requestedA virus is a program designed to interfere with yourcomputer, device or network’s normal operation. A virusattaches itself in a program or a file and like real-life viruses,computer viruses can multiply or make complete copies ofthemselves when you copy the program or file that it isattached to.1A worm is considered as type of virus. Like a virus, it canmake copies of itself in computers that it comes in contactwith.2. WormA Trojan Horse or simply a Trojan is a type of malware thatdisguises itself as a useful and\/or harmless program or file.Unwanted email mostly from bots or advertisers. It can beused to send malware.4. SpamA program designed to send you advertisements, mostly aspop-ups - take the quiz", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"What is the purpose of confidentiality in information security?, Which of the following is a type of malware that disguises itself as a legitimate program or file?, What is the primary goal of integrity in information security?","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
More Quizzes
Creative Credit and Copyright
740
Mr Tan's Practice Quiz for WICS G9 Literature Test on 'Quality' & 'Forty Thieves'
9438
APQS-131117
1780
2020-2021 Catechists
630
Free Communication Styles Knowledge Test
201024645
Tones & Semitones: What Are Semitones in Music?
201046589
Free Sentence Structure Practice
201022909
Writing in the Disciplines
15828132
Electricity: Charged Particles & Science Trivia
201051939
Free English Speaking Proficiency
201023087
Ultimate Van Halen Trivia: Test Your Rock Knowledge
201025301
Free Loan Case Management Knowledge Test
201024231