_____________ has been defined as ensuring information is accessible only to those authorized to have access and is one of the cornerstones of information security.
A. integrity
B. confidentiality
C. accessibility
D. availability
E. privacy
Answer: B
You might also like to view...
A document can be saved as ____________________ text so it can be opened by other word processing software.
Fill in the blank(s) with the appropriate word(s).
Sum all the elements of the array, using a for statement. Declare the integer variable x as a control variable for the loop.
What will be an ideal response?
When using gestures, you can zoom in, zoom out, and switch between applications
Indicate whether the statement is true or false
What will occur when two or more devices send a signal at the same time to a hub device?
A) An electrical collision will occur, corrupting both signals. B) A collision will be detected, and neither signal will go through. C) A collision will be detected, and the devices will have to take turns sending. D) The first signal to arrive will be sent, and the other signal(s) will have to wait.