System Administrator 2026
What is the breach of integrity?
- A. This type of violation involves unauthorized reading of data
- B. This violation involves unauthorized modification of data
- C. This violation involves unauthorized destruction of data
- D. This violation involves unauthorized use of resources
What is breach of confidentiality?
- A. This type of violation involves unauthorized reading of data
- B. This violation involves unauthorized modification of data
- C. This violation involves unauthorized destruction of data
- D. This violation involves unauthorized use of resources
What is theft of service?
- A. This type of violation involves unauthorized reading of data
- B. This violation involves unauthorized modification of data
- C. This violation involves unauthorized destruction of data
- D. This violation involves unauthorized use of resources
What is breach of availability?
- A. This type of violation involves unauthorized reading of data
- B. This violation involves unauthorized modification of data
- C. This violation involves unauthorized destruction of data
- D. This violation involves unauthorized use of resources
What is Trojan horse?
- A. It is a useful way to encrypt password
- B. It is a user which steals valuable information
- C. It is a rogue program which tricks users
- D. It’s a brute force attack algorithm
What is trap door?
- A. It is trap door in wargames
- B. It is a hole in software left by designer
- C. It is a trojan horse
- D. It is a virus which traps and locks user terminal