Sara, a security administrator, manually hashes all network device configuration files daily and compares them to the previous days' hashes. Which of the following security concepts is Sara using?

A. Confidentiality
B. Compliance
C. Integrity
D. Availability


Ans: C. Integrity

Computer Science & Information Technology

You might also like to view...

When adding a node to a tree use:

a) treeView.Nodes[ parentIndex ].Nodes.Add(new TreeNode(ChildLabel)) b) treeView.Node[parentIndex].Add(new TreeNode(ChildLabel)) c) treeView.Node[parentIndex].Add(ChildLabel) d) treeView.Node[parentIndex].Nodes.Add(ChildLabel)

Computer Science & Information Technology

The primary purpose of the IEEE is to create Web standards.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

________ view displays one record at a time and is how most forms display data

Fill in the blank(s) with correct word

Computer Science & Information Technology

A VMM divides access to a computer's physical resources among virtualized operating systems, while an emulator provides a full reproduction of both an operating system and applications

Indicate whether the statement is true or false

Computer Science & Information Technology