Question 6 of 100Internal intrusions are loosely divided into which categories? (Choose TWO.)Question 7 of 100_________ occurs when an individual or process acquires a higher level of privilege. Or access, than originally intended.Question 8 of 100Which encryption algorithm has the highest bit strength?Question 9 of 100How is bogus information disseminated?Question 10 of 100Which type of Business Continuity Plan (BCP) test involves shutting down z on-line, and moving all operations to the alternate site?