Recently, hackers successfully carried out a denial of service (DoS) attack against your company's database. Which security tenet was compromised during this attack?
A. Confidentiality
B. Integrity
C. Availability
D. Authentication
C
Explanation: Availability was compromised during this attack. A DoS attack will cause the device to be unavailable to legitimate users because the device is bombarded with connections.
You might also like to view...
A(n) ________ join combines each row from one table with each row in a related table
Fill in the blank(s) with correct word
What is the primary task of an operating system?
a. Rename files b. Reset operating passwords c. Operate the processing system d. Store and organize your files and folders
In the accompanying figure, you can remove a column by clicking just above the field name to select the column and then clicking the ____ key(s).
A. CTRL + DELETE B. CTRL + Y C. DELETE D. CTRL+ALT
During the ______ phase of the software life cycle, formal methods may be used to prove the correctness of an algorithm.
a) specification b) verification c) testing d) design