1- Alison discovers that a system under her control has been infected with malware, which is using a

1- Alison discovers that a system under her control has been infected with malware, which is using a keylogger to report user keystrokes to a third party. What information security property is this malware attacking?

Question options:

a) Availability

b) Accounting

c) Confidentiality

2- What file type is least likely to be impacted by a file infector virus?

Question options:

a) .exe

b) .docx

c) .dll

3- Mary is designing a software component that will function at the Presentation Layer of the Open Systems Interconnection (OSI) model. What other two layers of the model will her component need to interact with?

Question options:

a) Network and Session

b) Session and Transport

c) Application and Session

NEED HELP WITH SUCH A TASK? WE HAVE THE BEST TUTORS FOR YOU. ORDER NOW FROM 10$/PG