The CIA triad is based on three characteristics of information that form the foundation for many security programs: ____.

A. confidentiality, integrity, and asset
B. confidentiality, integrity, and availability
C. confidentiality, information, and availability
D. communication, information, and asset


Answer: B

Computer Science & Information Technology

You might also like to view...

Which of the following is not a form of electronic output?

A) web pages B) email C) report D) online message boards

Computer Science & Information Technology

If a programmer wishes to add a calendar to a Web ordering system to allow users to specify a pick-up date, he/she might use ________ displays

A) POD B) cookie C) adware D) ActiveX

Computer Science & Information Technology

_____ generally refers to applications and services that use the Web as a platform to deliver rich applications that enable people to collaborate, socialize, and share information online.

A. ?Internet2 B. ?Web 2.0 C. ?Plagiarism D. ?Blu-ray

Computer Science & Information Technology

You can switch between views using the commands in the Presentation Views group on the VIEW tab. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology