Which two principles of the CIA triad can be violated by a fabrication attack?
A. Integrity and authenticity
B. Integrity and availability
C. Confidentiality and integrity
D. Confidentiality and availability
Ans: B. Integrity and availability
You might also like to view...
____ refers to multiple layers of security controls and safeguards is called.
A. A DMZ B. A security perimeter C. Defense in depth D. Layered redundancy
Where does a header print?
A) At the top of each slide or notes pages B) At the top of each sheet of slide handouts or notes pages C) On each notes page D) On the right side of each slide and on the right side of the slide handouts
Computers cannot have more than one network adapter installed at a time
Indicate whether the statement is true or false
The height of a tree is the level of the leaf in the longest path from _____.
A. the root B. the root plus 1 C. its farthest descendant D. its father plus 1