Which of the following is not part of the CIA triangle?
A) Integrity
B) Confidentiality
C) Discretion
D) Availability
C) Discretion
Computer Science & Information Technology
You might also like to view...
PNG uses ____ compression.
A. lossy B. lossless C. fluid D. transparent
Computer Science & Information Technology
In an 802.1X connection, the authenticator is software running on a workstation
Indicate whether the statement is true or false
Computer Science & Information Technology
When the TAB key is pressed, a(n) ____________________ formatting mark appears in the empty space between the tab stops.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Describe at least four tips to keep in mind to promote the creation of clear, effective XSLT style sheets.
What will be an ideal response?
Computer Science & Information Technology