Availability, Integrity, Authentication, Confidentiality, and Nonrepudiation are the five key attributes of ________.

A. information assurance
B. data integrity
C. referential integrity
D. multi-factor authentication


Answer: A

Computer Science & Information Technology

You might also like to view...

List software tools that can aid the developer in doing a variety of tests of code.

What will be an ideal response?

Computer Science & Information Technology

An operand is a mathematical symbol

Indicate whether the statement is true or false

Computer Science & Information Technology

You can use the unset() function to remove array elements and other variables.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In a three-column layout, if you use a nonfloating footer element, with the clear property set to ____, the containing wrapper will extend to contain all elements.

A. left B. both C. right D. none

Computer Science & Information Technology