Access control is intended to guard the ____ of information by making it accessible only to authorized users.
A. confidentiality
B. availability
C. integrity
D. non-repudiation
Answer: B
You might also like to view...
Critical Thinking QuestionsCase 1Ellie wants to use Office 2013 for her catering business. For example, she plans to use Word to maintain her collection of recipes, and Excel to manage her budget. To get started, Ellie turns to you for help in understanding the components that appear in the Microsoft Word window.Ellie next asks you about the component located near the top of the window below the title bar. You explain that it provides easy, central access to the tasks performed while creating a document. What is the name of this component? a.scroll barc.ribbonb.status bard.mini toolbar
What will be an ideal response?
Write a class ContactInfo to store contact information for a person. It should have attributes for a person’s name, business phone, home phone, cell phone, email address, and home address. It should have a toString method that returns this data as a string, making appropriate replacements for any attributes that do not have values. It should have a constructor ContactInfo(aString) that creates and returns a new instance of the class, using data in the string aString. The constructor should use a format consistent with what the toString method produces. Using a text editor, create a text file of contact information, as described in the previous paragraph, for several people. Write a program that reads this file, displays the data on the screen, and creates an array whose base type is Contac
What will be an ideal response?
Discuss a virus and related examples of malware, also include definitions of the term payload, and a discussion of how a virus delivers a payload in your answer. Explain a common way through which computers and mobile devices become infected with viruses, and list common types of malware
What will be an ideal response?
Investigations involving the preservation, identification, extraction, documentation, and interpretation of computer media for evidentiary and root cause analysis are known as _________.
A. digital forensics B. criminal investigation C. crime scene investigation D. e-discovery