Which of the following ensures that data is accessible when needed to authorized users?
A. Confidentiality
B. Non-repudiation
C. Integrity
D. Availability
Answer: D
Computer Science & Information Technology
You might also like to view...
What is the difference between workflow analysis and job analysis?
What will be an ideal response?
Computer Science & Information Technology
Which of the following is not true about saving your presentation in the PowerPoint Picture Presentation format?
A) It flattens all slide objects into one layer. B) The file size is smaller. C) It is easier for others to modify. D) It is harder for others to modify.
Computer Science & Information Technology
Describe a man-in-the-middle attack.
What will be an ideal response?
Computer Science & Information Technology
Which predicate keyword is a set membership predicate?
a. ANY b. ALL c. SOME d. IN
Computer Science & Information Technology