Recently, hackers successfully carried out a denial of service (DoS) attack against your company's database. Which security tenet was compromised during this attack?

A. Confidentiality
B. Integrity
C. Availability
D. Authentication


C

Explanation: Availability was compromised during this attack. A DoS attack will cause the device to be unavailable to legitimate users because the device is bombarded with connections.

Computer Science & Information Technology

You might also like to view...

A(n) ________ join combines each row from one table with each row in a related table

Fill in the blank(s) with correct word

Computer Science & Information Technology

What is the primary task of an operating system?

a. Rename files b. Reset operating passwords c. Operate the processing system d. Store and organize your files and folders

Computer Science & Information Technology

In the accompanying figure, you can remove a column by clicking just above the field name to select the column and then clicking the ____ key(s).

A. CTRL + DELETE B. CTRL + Y C. DELETE D. CTRL+ALT

Computer Science & Information Technology

During the ______ phase of the software life cycle, formal methods may be used to prove the correctness of an algorithm.

a) specification b) verification c) testing d) design

Computer Science & Information Technology