The CIA triad is based on three characteristics of information that form the foundation for many security programs: ____.
A. confidentiality, integrity, and asset
B. confidentiality, integrity, and availability
C. confidentiality, information, and availability
D. communication, information, and asset
Answer: B
You might also like to view...
Which of the following is not a form of electronic output?
A) web pages B) email C) report D) online message boards
If a programmer wishes to add a calendar to a Web ordering system to allow users to specify a pick-up date, he/she might use ________ displays
A) POD B) cookie C) adware D) ActiveX
_____ generally refers to applications and services that use the Web as a platform to deliver rich applications that enable people to collaborate, socialize, and share information online.
A. ?Internet2 B. ?Web 2.0 C. ?Plagiarism D. ?Blu-ray
You can switch between views using the commands in the Presentation Views group on the VIEW tab. _________________________
Answer the following statement true (T) or false (F)