____ refers to the efforts taken through policy, procedure, and design in order to create and maintain the privacy and discretion of information and systems.

A. Availability
B. Confidentiality
C. Portability
D. Integrity


Answer: B

Computer Science & Information Technology

You might also like to view...

Create a PERT/CPM chart.

What will be an ideal response?

Computer Science & Information Technology

Write ONE Java statement to display your first and last name on two separate lines.

What will be an ideal response?

Computer Science & Information Technology

The four layers of the TCP/IP protocol stack, in order from highest to lowest, are __________, __________, __________ and __________.

a) application, transport, network, link b) application, network, transport, link c) network, link, application, transport d) link, transport, application, network

Computer Science & Information Technology

Which of the following is NOT an advantage of virtual teams as compared to standard teams?

A) The best person for the job might work at a different location, which could be accessed virtually. B) Virtual team members can be selected from other countries to provide cultural views. C) Virtual team members may feel isolated from coworkers. D) Virtual team members can spend time meeting rather than traveling.

Computer Science & Information Technology