Request New Subject
Home
Computer Science Engineering (CSE)
Information Cyber Security (ICS)
Q. Compromising confidential information comes under _________ (Solved)
1. a) bug
2. b) threat
3. c) vulnerability
4. d) attack
b. b) threat
Related Topics
→ Computer Architecture and Organization
→ Microprocessor and Interfacing Technique
→ Computer Networks
→ Data Structure and Algorithms (DSA)
→ Operating System (OS)
→ Artificial Intelligence and Robotics (AIR)
→ Software Project Management (SPM)
→ Computer Fundamentals
→ High Performance Computing (HPC)
→ Data Communication and Computer Network
Subscribe Now
Get All Updates & News
Subscribe