Which file action implements the principle of confidentiality from the CIA triad?

A. Compression
B. Hash
C. Backup
D. Encryption


Answer: D. Encryption

Computer Science & Information Technology

You might also like to view...

Function mismatch returns:

a. The position number where the two specified sequences do not match. b. A pair containing the two elements in the specified sequences that do not match. c. A pair containing two iterators pointing to the two locations in the specified sequences that do not match. d. A bool indicating whether the two specified sequences do not match.

Computer Science & Information Technology

An item that separates other items is known as a

a. partition b. delimiter c. sentinel d. terminator

Computer Science & Information Technology

Open Read-Only opens the database so that changes can be made, but on one else may open the database at the same time

Indicate whether the statement is true or false

Computer Science & Information Technology

When you create a PivotTable report the fields in your table that describe the values are positioned as row or column labels

Indicate whether the statement is true or false

Computer Science & Information Technology