Your company decides to implement hashing to ensure that several crucial files are not changed. Which security tenet will this cover?

A. Confidentiality
B. Integrity
C. Availability
D. Accountability


B

Explanation: Implementing hashing to ensure that several crucial files are not changed will cover the integrity tenet. Hashing will allow you to determine if the file has been changed by comparing the original hash value to a new hash value. If the values match, the file is unchanged. If the values do not match, the file has been changed.

Computer Science & Information Technology

You might also like to view...

A file consisting of organized data is known as a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following is a comparison operator?

A) / B) <> C) * D) +

Computer Science & Information Technology

Case EX 8-2Paco wants to change some of the elements in his chart, including the fill and border color.What type of dialog box does Paco need to access to make these changes? 

A. Format dialog box B. Chart dialog box C. Style dialog box D. Layout dialog box

Computer Science & Information Technology

When creating a collage of images where you want to blend one image into another, use ____ to blur the edge of the selection.

a. marching ants b. droplets c. channels d. feathering

Computer Science & Information Technology