With respect to security, CIA stands for?

A. Confidentiality, integrity, and availability
B. Confidentiality, information, and availability
C. Confidentiality, integrity, and authentication
D. Confidentiality, information, and authorization


A. Confidentiality, integrity, and availability

Computer Science & Information Technology

You might also like to view...

Variables should be declared as fields only if ________.

a. they are local variables b. they are used only within a method c. they are required for use in more than one method or their values must be saved between calls to the class’s methods d. they are arguments

Computer Science & Information Technology

There is a OneNote App that can be added to your Windows 8.1 PC, tablet, or smartphone

Indicate whether the statement is true or false

Computer Science & Information Technology

When you set up a Web server, how can you protect your network against an overwhelming number of requests due to a particularly popular page, or resulting from a malicious attack?

What will be an ideal response?

Computer Science & Information Technology

A(n) _______________ refers to the component that provides the ?touch? part of a touch screen.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology