_____ protects information from unauthorized disclosure and safeguards privacy.

A. Availability
B. Integrity
C. Confidentiality
D. Accessibility


Answer: C

Computer Science & Information Technology

You might also like to view...

The two types of attack on an encryption algorithm are cryptanalysis, based on properties of the encryption algorithm, and _________ which involves trying all possible keys.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What is the purpose of Class D IP addresses?

What will be an ideal response?

Computer Science & Information Technology

The ____ stage of the attack methodology is a systematic survey of the target organization's Internet addresses, conducted to identify the network services offered by the hosts in that range.

A. auditing B. fingerprinting C. activating D. validating

Computer Science & Information Technology

Josh and Colleen, a celebrity chef couple and restaurant owners from Cherry Hill, New Jersey, want to be able to receive clear feedback on the systems used to manage food inventory at their many “farm to table” restaurants in Philadelphia and New York City.

What will be an ideal response?

Computer Science & Information Technology