________ ensures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.

A) Availability
B) System integrity
C) Accountability
D) Authenticity


B) System integrity

Computer Science & Information Technology

You might also like to view...

What is the purpose of a “Hello” packet?

a. It is used to partition a large network into smaller networks. b. It verifies that the link between two routers is active and the routers are communicating. c. It enables VLSM. d. It is assigned to a protocol or route to declare its reliability.

Computer Science & Information Technology

____________________ data can make parts of a program worthless.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The discovery by Gödel places a limit on the capabilities of computers and computer scientists. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A hard drive or solid state drive that is physically installed inside of a workstation would generally be considered to be what type of storage?

A. Local storage B. Direct-Attached Storage C. Network Attached Storage D. Storage Area Network

Computer Science & Information Technology