The definition of integrity as applied to identification, authentication, and encryption is
a. having information ready when needed.
b. not being able to deny who performed network actions.
c. the protection of the network from those not authorized access.
d. the assurance that no one has changed or destroyed information without permission.
Ans: d. the assurance that no one has changed or destroyed information without permission.
You might also like to view...
The best method of designing a motor control circuit is to solve one requirement at a time.
Answer the following statement true (T) or false (F)
Which of the following is a negative factor that people use to determine whether to become entrepreneurs?
A. Roles: Fulfilling family tradition, acting as leader B. Self-realization: Recognition, achievement, status C. Innovation: Creating something new D. Risk: Potential for loss of income and wealth
What are the two most common methods of circuit protection in structures?
What will be an ideal response?
If poor-quality roughages are fed, extra ____________________ may be needed
Fill in the blank(s) with the appropriate word(s).