Which of the following ensures that data is accessible when needed to authorized users?

A. Confidentiality
B. Non-repudiation
C. Integrity
D. Availability


Answer: D

Computer Science & Information Technology

You might also like to view...

What is the difference between workflow analysis and job analysis?

What will be an ideal response?

Computer Science & Information Technology

Which of the following is not true about saving your presentation in the PowerPoint Picture Presentation format?

A) It flattens all slide objects into one layer. B) The file size is smaller. C) It is easier for others to modify. D) It is harder for others to modify.

Computer Science & Information Technology

Describe a man-in-the-middle attack.

What will be an ideal response?

Computer Science & Information Technology

Which predicate keyword is a set membership predicate?

a. ANY b. ALL c. SOME d. IN

Computer Science & Information Technology