A software company has completed a security assessment. The assessment states that the company should implement fencing and lighting around the property. Additionally, the assessment states that production releases of their software should be digitally signed. Given the recommendations, the company was deficient in which of the following core security areas?

A. Fault tolerance
B. Encryption
C. Availability
D. Integrity
E. Safety
F. Confidentiality


Answer:
D. Integrity
E. Safety

Computer Science & Information Technology

You might also like to view...

A(n) ____________ is a method with no body that appears in a base class, and must be overridden in a (non-abstract) derived class.

a. shadow method b. base method c. derived method d. abstract method

Computer Science & Information Technology

A Windows 7 business computer can only be reimaged three times

Indicate whether the statement is true or false

Computer Science & Information Technology

The _________________ command is used to access digital pictures from sources, such as the Bing Image Search Box, Flickr, or your OneDrive.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The X.500 standard defines a protocol for a client application to access an X.500 directory called the ____.

A. DAP B. DIB C. DIT D. DIU

Computer Science & Information Technology