The lecture Specialized IT Security by Lecturio Online Courses is from the course IT Security and Cyber Security – Instruction.
What information security protection objectives should you consider? (Multiple answers are possible)
A Cyber-attack is… (Only one answer is correct)
IT security, data security, and data protection – how are these terms related? (Only one answer is correct)
| 5 Stars |
|
5 |
| 4 Stars |
|
0 |
| 3 Stars |
|
0 |
| 2 Stars |
|
0 |
| 1 Star |
|
0 |