If an attacker breaks into a corporate database and steals critical files then deletes the files, against what security goal/s is this attack aimed

A. Confidentiality only
B. Confidentiality and Availability
C. Availability and Integrity
D. Integrity and Confidentiality


B. Confidentiality and Availability

Computer Science & Information Technology

You might also like to view...

Explain the contextual factors to be taken into account when adapting multimedia content.

What will be an ideal response?

Computer Science & Information Technology

An acute care facility is used for ongoing treatment or care

Indicate whether the statement is true or false

Computer Science & Information Technology

A(n) ____________________ function is a function that works with statements that are either true or false.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Creating relationships is not an effective way to test your normalization.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology