Which of the following are the three elements of the CIA triad?

A) Authentication, integrity, confidentiality
B) Availability, integrity, confidentiality
C) Access, integrity, confidentiality
D) Authorization, integrity, confidentiality


B) Availability, integrity, confidentiality

Computer Science & Information Technology

You might also like to view...

A ____ brush will affect pixels outside of the circle that represents the Brush tool.

A. wide B. narrow C. hard D. soft

Computer Science & Information Technology

Clustered Column is a type of Column chart. __________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which type of CM software can connect to inventory members via SSH to perform configuration management activities?

A. Agent-based B. BLOB C. agentless D. Kickstart

Computer Science & Information Technology

Why is regression testing an important part of any integration testing procedure?

What will be an ideal response?

Computer Science & Information Technology