Sara, a security administrator, manually hashes all network device configuration files daily and compares them to the previous days' hashes. Which of the following security concepts is Sara using?
A. Confidentiality
B. Compliance
C. Integrity
D. Availability
Ans: C. Integrity
You might also like to view...
When adding a node to a tree use:
a) treeView.Nodes[ parentIndex ].Nodes.Add(new TreeNode(ChildLabel)) b) treeView.Node[parentIndex].Add(new TreeNode(ChildLabel)) c) treeView.Node[parentIndex].Add(ChildLabel) d) treeView.Node[parentIndex].Nodes.Add(ChildLabel)
The primary purpose of the IEEE is to create Web standards.
Answer the following statement true (T) or false (F)
________ view displays one record at a time and is how most forms display data
Fill in the blank(s) with correct word
A VMM divides access to a computer's physical resources among virtualized operating systems, while an emulator provides a full reproduction of both an operating system and applications
Indicate whether the statement is true or false