Match the following security terms on the left with the definitions on the right
1. Confidentiality a. the base security configuration selected by an organization
2. Integrity b. the practice of using multiple layers of security between data and the resources on which it resides and possible attackers
3. Availability c. ensuring that data is accessible when and where it is needed
4. Default stance d. prevents the disclosure of data or information to unauthorized entities
5. Defense in depth e. ensures that data is protected from unauthorized modification or data corruption
1-d, 2-e, 3-c, 4-a, 5-b
You might also like to view...
The ____ is the most expensive Frame Relay topology to implement because each router has a direct connection to every other router.
A. full mesh B. star C. partial mesh D. peer
A(n) project team should consist of a number of individuals who are experienced in one or multiple facets of the technical and nontechnical areas. _________________________
Answer the following statement true (T) or false (F)
What are some safeguards that OS makers supply to combat malware?
What will be an ideal response?
Which statement is true about DNS root servers?
A. They handle all the name resolution tasks of the Internet. B. They are directly below the top-level domain server. C. They delegate name resolution to other DNS servers. D. They do not know any IP addresses.