Which component of the CIA triad will be impacted if an attacker cuts network cables?

A. Availability
B. Confidentiality
C. Authenticity
D. Integrity


Answer: A. Availability

Computer Science & Information Technology

You might also like to view...

When a browser encounters a plug-in or an ActiveX control that it doesn't recognize, it usually leaves a(n) ____where the embedded object normally would appear.

A. parentheses B. blank space C. asterick D. ampersand

Computer Science & Information Technology

How is the icon for an app displayed on the Start screen?

A) snip B) tile C) toolbar D) window

Computer Science & Information Technology

Internet address constructor with variables xx.yy.zz.mm and nickname

What will be an ideal response?

Computer Science & Information Technology

Robin has purchased a new computer that has the Windows 10 operating system. Excited about learning the new features of Windows 10, she starts the computer, enters her login information and takes a look at the desktop. She displays the Start menu and takes time to get acquainted with her new working environment. Robin feels more and more at home with Windows 10 when she realizes she can view the contents of her computer using an app on the taskbar called __________.

What will be an ideal response?

Computer Science & Information Technology