A software company has completed a security assessment. The assessment states that the company should implement fencing and lighting around the property. Additionally, the assessment states that production releases of their software should be digitally signed. Given the recommendations, the company was deficient in which of the following core security areas?
A. Fault tolerance
B. Encryption
C. Availability
D. Integrity
E. Safety
F. Confidentiality
Answer:
D. Integrity
E. Safety
You might also like to view...
A(n) ____________ is a method with no body that appears in a base class, and must be overridden in a (non-abstract) derived class.
a. shadow method b. base method c. derived method d. abstract method
A Windows 7 business computer can only be reimaged three times
Indicate whether the statement is true or false
The _________________ command is used to access digital pictures from sources, such as the Bing Image Search Box, Flickr, or your OneDrive.
Fill in the blank(s) with the appropriate word(s).
The X.500 standard defines a protocol for a client application to access an X.500 directory called the ____.
A. DAP B. DIB C. DIT D. DIU