The goal of information security is to protect the integrity, ____, and availability of data on the devices that store, manipulate, and transmit the information.

A. authorization
B. authentication
C. confidentiality
D. accounting


Answer: C

Computer Science & Information Technology

You might also like to view...

The DrawString method requires you specify all of the following except ________.

a) a string containing the text to draw b) the font to apply to the text c) a Pen with which to draw the text d) the position at which the first character of the text should be printed e) None of the above.

Computer Science & Information Technology

A(n) ____________________ area network is one that covers a large geographical area and typically consists of several smaller networks.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

When using a cell phone, a(n) ________ converter chip changes your voice's sound waves into digital signals

Fill in the blank(s) with correct word

Computer Science & Information Technology

Let A = {5, 6, 7, 8, 9} and let set B = {x| x is a natural number greater than 8}.  Determine whether the following is true or false.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology