In reference to the Top Threats Analysis methodology, how would you categorize the technical impact of this incident?

After finding a vulnerability in an internet-facing server of an organization, a cybersecurity criminal is able to access an encrypted file system and successfully manages to overwrite part of some files with random data.

In reference to the Top Threats Analysis methodology, how would you categorize the technical impact of this incident?
A . As an integrity breach
B . As control breach
C . As an availability breach
D . As a confidentiality breach

Answer: B

Latest CCAK Dumps Valid Version with 76 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments