Confidentiality
Integrity
None of these
Both of these
Availability
Spam
Injection
Spoofing
DoS attack
Phishing
Surfing
DDoS
Revealing
Trojan horse
Wamp
Eavesdropping
Darkmotel
Mirai
Petye
whitehorse
Match the following Internet security threats with their definitions.
A-1, B-2, C-3, D-4
A-4, B-3, C-1, D-2
A-3, B-4, C-2, D-1
A-2, B-1, C-4, D-3
Match the cryptographic attacks with their definitions.
1 → D, 2 → B, 3 → C, 4 →A
1 → C, 2 → A, 3 → B, 4 → D
1 → B, 2 → D, 3 → A, 4 → C
1 → A, 2 → D, 3 → B, 4 → C