Your organization has recently implemented several new security policies in response to a recent risk analysis. One of the new policies states that controls must be configured that will protect files from unauthorized or accidental deletion. Which aspect of security does this new policy address?
A. confidentiality
B. integrity
C. availability
D. authorization
B
Explanation: Configuring controls that will protect files from unauthorized or accidental deletion addresses data integrity.
Confidentiality is addressed by encryption. Availability is addressed by fault tolerant technologies. Authorization is addressed by access control lists (ACLs).
You might also like to view...
What does a key derivation do?
What will be an ideal response?
After you have located a program name from the Start menu, in order to create a shortcut on the desktop,:
A) right-click, drag the program name to the desktop, and click Create shortcuts here. B) left-click and choose Create shortcuts here. C) right-click and drag the program name to the desktop. D) double-click the program name and click Create shortcuts here.
If an administrator configures local text file logging in NPS, where is the log saved to?
A. C:\Logs B. C:\Windows\Logs C. C:\NPS\Logs D. C:\Windows\System32\LogFiles
The Database Documenter:
What will be an ideal response?