The goal of information security is to protect the integrity, ____, and availability of data on the devices that store, manipulate, and transmit the information.

A. authorization
B. authentication
C. confidentiality
D. accounting


Answer: C

Computer Science & Information Technology

You might also like to view...

Which of the following exceptions is a checked exception?

a. ArithmeticException. b. IOException. c. RuntimeException. d. InputMismatchException.

Computer Science & Information Technology

In a(n) ____________________ attack, the hacker transmits a large quantity of packets to the router for it to determine an effective and efficient path for transfer.?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

An XML database can be displayed by opening a _______.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

You want to obtain very detailed information about the health and forwarding statistics of your Cisco router. What protocol can help?

A) SNMP B) IP SLA C) NTP D) SMTP E) DNS

Computer Science & Information Technology