Answer the following statements true (T) or false (F)
1. Threats are attacks carried out.
2. Computer security is protection of the integrity, availability, and
confidentiality of information system resources.
3. Data integrity assures that information and programs are changed only
in a specified and authorized manner.
4. Availability assures that systems works promptly and service is not
denied to authorized users.
5. The “A” in the CIA triad stands for “authenticity”.
1. False
2. True
3. True
4. True
5. False
You might also like to view...
Embedded instructions are called ____ and they are encased in angle brackets.
A. HTML tags B. HTML formatting symbols C. format code D. HTML links
The Shapes gallery displays when the Crop button is clicked
Indicate whether the statement is true or false
You can use a(n) _______________ to create a collection that offers only read-only access to others while allowing read–write access to yourself.
Fill in the blank(s) with the appropriate word(s).
________ is a useful feature to see differences between two versions of a presentation
Fill in the blank(s) with correct word