adplus-dvertising
frame-decoration

Question

______ is the latest technology that faces an extra challenge because of CIA paradigm.

a.

Big data

b.

Database systems

c.

Cloud storages

d.

Smart dust

Posted under Cyber Security

Answer: (a).Big data

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. ______ is the latest technology that faces an extra challenge because of CIA paradigm.

Similar Questions

Discover Related MCQs

Q. One common way to maintain data availability is __________

Q. _______ is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.

Q. From the options below, which of them is not a threat to information security?

Q. From the options below, which of them is not a vulnerability to information security?

Q. _____ platforms are used for safety and protection of information in the cloud.

Q. Which of the following information security technology is used for avoiding browser-based hacking?

Q. The full form of EDR is _______

Q. _______ technology is used for analyzing and monitoring traffic in network and information flow.

Q. Compromising confidential information comes under _________

Q. Lack of access control policy is a _____________

Q. Possible threat to any information cannot be ________________

Q. How many basic processes or steps are there in ethical hacking?

Q. ____________ is the information gathering phase in ethical hacking from the target user.

Q. Which of the following is not a reconnaissance tool or technique for information gathering?

Q. There are ______ subtypes of reconnaissance.

Q. Which of the following is an example of active reconnaissance?

Q. Which of the following is an example of passive reconnaissance?

Q. ________ phase in ethical hacking is known as the pre-attack phase.

Q. While looking for a single entry point where penetration testers can test the vulnerability, they use ______ phase of ethical hacking.

Q. Which of them does not comes under scanning methodologies?