1.
_______ is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.
2.
From the options below, which of them is not a threat to information security?
3.
From the options below, which of them is not a vulnerability to information security?
4.
_____ platforms are used for safety and protection of information in the cloud.
5.
Which of the following information security technology is used for avoiding browser-based hacking?
6.
The full form of EDR is _______
7.
_______ technology is used for analyzing and monitoring traffic in network and information flow.
8.
Compromising confidential information comes under _________
9.
Lack of access control policy is a _____________
10.
Possible threat to any information cannot be ________________