Which of the following is not part of the CIA triangle?

A) Integrity
B) Confidentiality
C) Discretion
D) Availability


C) Discretion

Computer Science & Information Technology

You might also like to view...

PNG uses ____ compression.

A. lossy B. lossless C. fluid D. transparent

Computer Science & Information Technology

In an 802.1X connection, the authenticator is software running on a workstation

Indicate whether the statement is true or false

Computer Science & Information Technology

When the TAB key is pressed, a(n) ____________________ formatting mark appears in the empty space between the tab stops.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Describe at least four tips to keep in mind to promote the creation of clear, effective XSLT style sheets.

What will be an ideal response?

Computer Science & Information Technology