Which of the following concepts are included on the three sides of the "security triangle"?

A. Confidentiality
B. Availability
C. Integrity
D. Authorization
E. Authentication
F. Continuity


Ans:
A. Confidentiality
B. Availability
C. Integrity

Computer Science & Information Technology

You might also like to view...

If two classes have an IS_A relationship, we should use:

A. composition B. polymorphism C. inheritance D. static binding

Computer Science & Information Technology

Which of the following statements is false?

a. Function range’s one-argument version produces a sequence of consecutive integers from 0 up to, but not including, the argument’s value. b. The following snippet produces the sequence 5 6 7 8 9. for number in range(5, 10): print(number, end=' ') c. The following snippet produces the sequence 0 2 4 6 8. for number in range(0, 10, 2): print(number, end=' ') d. The following snippet produces the sequence 10 8 6 4 2 0. for number in range(10, 0, -2): print(number, end=' ')

Computer Science & Information Technology

Rapid provisioning can be performed by a PowerShell script or from within the VMM GUI.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

To initialize a set of nested structures, the values for each set are enclosed in a separate set of braces, separated by commas, and the entire set is enclosed in a set of braces.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology