Which two principles of the CIA triad can be violated by a fabrication attack?

A. Integrity and authenticity
B. Integrity and availability
C. Confidentiality and integrity
D. Confidentiality and availability


Ans: B. Integrity and availability

Computer Science & Information Technology

You might also like to view...

____ refers to multiple layers of security controls and safeguards is called.

A. A DMZ B. A security perimeter C. Defense in depth D. Layered redundancy

Computer Science & Information Technology

Where does a header print?

A) At the top of each slide or notes pages B) At the top of each sheet of slide handouts or notes pages C) On each notes page D) On the right side of each slide and on the right side of the slide handouts

Computer Science & Information Technology

Computers cannot have more than one network adapter installed at a time

Indicate whether the statement is true or false

Computer Science & Information Technology

The height of a tree is the level of the leaf in the longest path from _____.

A. the root B. the root plus 1 C. its farthest descendant D. its father plus 1

Computer Science & Information Technology