•
Question 13
Loss of financial assets due to ________ is a worst-case scenario for all organizations.
•
Question 14
What term is used to describe an attack in which the attacker gets between two
parties and intercepts messages before transferring them on to their intended destination?
•
Question 15
What name is given to any event that results in a violation of any of the C-I-A security
tenets?