In the Security triad ________ provides assurances that data and IT systems are not modified

a. Engineering
b. Confidentiality
c. Availability
d. None of the above


D.Integrity provides assurances that data and IT systems are not modified. The other two elements are confidentiality and availability.

Computer Science & Information Technology

You might also like to view...

Source Protection capability can be used to:

Limit a user of your Add-On instruction to read-only access. b. Allow no access to the internal logic or the Local Tags used by the instruction. c. Disable the use of the instruction. d. a and b and c are correct. e. a and b are correct.

Computer Science & Information Technology

The Spell Check feature often flags proper names, even though they are spelled correctly

Indicate whether the statement is true or false

Computer Science & Information Technology

Most media players can play both________and video files.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

________ computers are alternatives to traditional desktop or laptop computers

Fill in the blank(s) with correct word

Computer Science & Information Technology