In the Security triad ________ provides assurances that data and IT systems are not modified
a. Engineering
b. Confidentiality
c. Availability
d. None of the above
D.Integrity provides assurances that data and IT systems are not modified. The other two elements are confidentiality and availability.
You might also like to view...
Source Protection capability can be used to:
Limit a user of your Add-On instruction to read-only access. b. Allow no access to the internal logic or the Local Tags used by the instruction. c. Disable the use of the instruction. d. a and b and c are correct. e. a and b are correct.
The Spell Check feature often flags proper names, even though they are spelled correctly
Indicate whether the statement is true or false
Most media players can play both________and video files.
Fill in the blank(s) with the appropriate word(s).
________ computers are alternatives to traditional desktop or laptop computers
Fill in the blank(s) with correct word