If an attacker breaks into a corporate database and steals critical files then deletes the files, against what security goal/s is this attack aimed
A. Confidentiality only
B. Confidentiality and Availability
C. Integrity and Confidentiality
D. Availability and Integrity
B. Confidentiality and Availability
You might also like to view...
Which statement is false?
a. Streams-based transmission is connection-oriented. b. Connection-oriented transmission is like the telephone system. c. Datagram-based transmission is connection oriented. d. Connectionless transmission is like the way the mail is carried by the postal service.
____ is the process of changing or intensifying the color of a photograph after it has been processed by the camera.
a. Montage b. Grayscale c. Color toning d. Repurposing
A company's ________ database is the database used to carry out day-to-day tasks, such as payroll and inventory management, of an organization
Fill in the blank(s) with correct word
The bottom element of the stack is the last element added to the stack.
Answer the following statement true (T) or false (F)