The three elements of the Security Triad are confidentiality, integrity, and availability
Indicate whether the statement is true or false
True Understanding each of these elements goes a long way tohelping you understand the goals of many security programs and security controls.
You might also like to view...
Suppose you are assigned to manage a virtual team. Which of the following will you NOT do?
A. define goals, and set expectations B. be aware of team members cultural sensitivity C. ensure the team members are familiar with each other at a personal level D. hold team meetings regularly - whether the team members like it or not
The ____________ command shows current sessions with associated port numbers.
Fill in the blank(s) with the appropriate word(s).
______ transforms a smartphone or Internet-capable tablet into a portable communications device that shares its Internet access with other computers and devices wirelessly.
Fill in the blank(s) with the appropriate word(s).
Which of the following is a network device attribute that may be used in conjunction with DHCP, making asset identification using this attribute difficult?
A. part number B. serial number C. MAC address D. IP address