Phishing combined with VOIP is known as ________________
The ability to hide few things from an Operating system is there in some programs, these programs are called ______________.
_________ is the term used when dealing with threats, vulnerabilities or impact incurred while loss of information.
__________________ is an encryption method in Windows through with the entire volume can be encrypted with 128 bit encryption.
According to NIST (National Institute of Standards and Technology) __________ is a score that represents the possibility of a threat being initiated.
SLE (Single Loss Expectancy) is a term used in Risk Calculations which is used to represent how much loss is expected at one single time. Which of the below are components of SLE?
_______________ is the measure of how much loss is expected in a year in reference to Risk Calculations.
ARO is the likelihood of an event occurring within span of a year. ARO stands for ___________
Which of the below documents need to be part of any interoperability agreement?
____________________ is a weakness that can be exploited by a threat.
Question 1 of 10