ExamGecko
Question list
Search
Search

List of questions

Search

Question 79 - CCAK discussion

Report
Export

After finding a vulnerability in an internet-facing server of an organization, a cybersecurity criminal is able to access an encrypted file system and successfully manages to overwrite part of some files with random data. In reference to the Top Threats Analysis methodology, how would you categorize the technical impact of this incident?

A.
As an integrity breach
Answers
A.
As an integrity breach
B.
As control breach
Answers
B.
As control breach
C.
As an availability breach
Answers
C.
As an availability breach
D.
As a confidentiality breach
Answers
D.
As a confidentiality breach
Suggested answer: B
asked 18/09/2024
Ksu doo Makek
45 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first