adplus-dvertising
frame-decoration

Question

Compromising confidential information comes under _________

a.

Bug

b.

Threat

c.

Vulnerability

d.

Attack

Posted under Cyber Security

Answer: (b).Threat

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Compromising confidential information comes under _________

Similar Questions

Discover Related MCQs

Q. Lack of access control policy is a _____________

Q. Possible threat to any information cannot be ________________

Q. How many basic processes or steps are there in ethical hacking?

Q. ____________ is the information gathering phase in ethical hacking from the target user.

Q. Which of the following is not a reconnaissance tool or technique for information gathering?

Q. There are ______ subtypes of reconnaissance.

Q. Which of the following is an example of active reconnaissance?

Q. Which of the following is an example of passive reconnaissance?

Q. ________ phase in ethical hacking is known as the pre-attack phase.

Q. While looking for a single entry point where penetration testers can test the vulnerability, they use ______ phase of ethical hacking.

Q. Which of them does not comes under scanning methodologies?

Q. Which of them is not a scanning tool?

Q. Which of the following comes after scanning phase in ethical hacking?

Q. In __________ phase the hacker exploits the network or system vulnerabilities.

Q. Which of the following is not done in gaining access phase?

Q. Which of the below-mentioned penetration testing tool is popularly used in gaining access phase?

Q. A _________ can gain access illegally to a system if the system is not properly tested in scanning and gaining access phase.

Q. In which phase, the hackers install backdoors so that his/her ownership with the victim’s system can be retained later?

Q. _______ is the tool used for this purpose.

Q. Which of the following hacking tools and techniques hackers’ do not use for maintaining access in a system?