____ ensures that the information is correct and that no unauthorized person or malicious software has altered it.

A. Integrity
B. Availability
C. Confidentiality
D. Access control


Answer: A

Computer Science & Information Technology

You might also like to view...

We need to specify that a LCDMonitor class inherits from a Monitor class. The notation for doing so look like this:

A. class LCDMonitor inherits from Monitor B. class LCDMonitor : class Monitor C. class LCDMonitor : Monitor D. class LCDMonitor : public Monitor

Computer Science & Information Technology

Which of the following is the mode that is active when the CLI prompt displays hostname(config-if)#?

A) Global B) Line C) Interface D) VLAN

Computer Science & Information Technology

Which of the following topics is covered under the cryptography CBK domain?

A. Understanding and using digital certificates B. Establishing secure communication channels C. Managing incident response D. Understanding access control attacks

Computer Science & Information Technology

The Backspace key is represented by the ____ constant.

A. ControlChars.Back B. ControlChars.BackSpace C. ControlChars.Backspace D. ControlChars.Backspc

Computer Science & Information Technology