If an attacker breaks into a corporate database and steals critical files then deletes the files, against what security goal/s is this attack aimed

A. Confidentiality only
B. Confidentiality and Availability
C. Integrity and Confidentiality
D. Availability and Integrity


B. Confidentiality and Availability

Computer Science & Information Technology

You might also like to view...

Which statement is false?

a. Streams-based transmission is connection-oriented. b. Connection-oriented transmission is like the telephone system. c. Datagram-based transmission is connection oriented. d. Connectionless transmission is like the way the mail is carried by the postal service.

Computer Science & Information Technology

____ is the process of changing or intensifying the color of a photograph after it has been processed by the camera.

a. Montage b. Grayscale c. Color toning d. Repurposing

Computer Science & Information Technology

A company's ________ database is the database used to carry out day-to-day tasks, such as payroll and inventory management, of an organization

Fill in the blank(s) with correct word

Computer Science & Information Technology

The bottom element of the stack is the last element added to the stack.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology