____ ensures that the information is correct and that no unauthorized person or malicious software has altered it.
A. Integrity
B. Availability
C. Confidentiality
D. Access control
Answer: A
You might also like to view...
We need to specify that a LCDMonitor class inherits from a Monitor class. The notation for doing so look like this:
A. class LCDMonitor inherits from Monitor B. class LCDMonitor : class Monitor C. class LCDMonitor : Monitor D. class LCDMonitor : public Monitor
Which of the following is the mode that is active when the CLI prompt displays hostname(config-if)#?
A) Global B) Line C) Interface D) VLAN
Which of the following topics is covered under the cryptography CBK domain?
A. Understanding and using digital certificates B. Establishing secure communication channels C. Managing incident response D. Understanding access control attacks
The Backspace key is represented by the ____ constant.
A. ControlChars.Back B. ControlChars.BackSpace C. ControlChars.Backspace D. ControlChars.Backspc