With respect to security, CIA stands for?
A. Confidentiality, integrity, and availability
B. Confidentiality, information, and availability
C. Confidentiality, integrity, and authentication
D. Confidentiality, information, and authorization
A. Confidentiality, integrity, and availability
You might also like to view...
Why would you want to assign quota points to users?
A. to restrict how many VMs they have access to B. to restrict the number of simultaneous running VMs C. to assign the maximum amount of disk space they can use D. to specify how much processing time each VM can use
The art of ____________________ analysis consists in balancing time spent optimizing a problem’s solution before computation against time spent correcting unforeseen errors during computation.
Fill in the blank(s) with the appropriate word(s).
You have been tasked with configuring a SOHO network in which all ports on the public untrusted network will be forwarded to one workstation connected to the LAN. Which of the following features will you configure on the SOHO router to accomplish this task?
A. Port forwarding B. MAC filtering C. Demilitarized zone D. Quality of service
A set Y is called a(n) ____________________ of X if every element of Y is also an element of X.
Fill in the blank(s) with the appropriate word(s).