Q1. During a periodical review of information security controls and their effectiveness in a corporation, that a file was found to be containing privacy-related data in a publicly accessible location. Which one of the following is ultimately responsible for such a security violation?
Q2. ______ is a cryptographic method in which plain text is scrambled to form a scrambled text that is not directly readable without unscrambling.
Q3. Which one of the following is a malicious threat?
Q4. Which one of the following is a Recovery Time Objective (RTO)?