If an attacker breaks into a corporate database and steals critical files then deletes the files, against what security goal/s is this attack aimed

A. Confidentiality and Availability
B. Confidentiality only
C. Integrity and Confidentiality
D. Availability and Integrity


C. Integrity and Confidentiality

Computer Science & Information Technology

You might also like to view...

What are each of the following:

1. Clipping 2. Normalize 3. Amplitude 4. Frequency 5. Rarefactions 6. WAV 7. Iterate 8. For each loop 9. A sine wave

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. The first web browser was introduced in 1991. 2. In early computers, vacuum tubes were used to do the internal switching necessary for computations. 3. The transistor is a great improvement over the vacuum tube because it is much more energy efficient. 4. The browser resides on a server. 5. A network consists of two or more linked computers that can share resources.

Computer Science & Information Technology

What is the difference between a bound control and an unbound control?

What will be an ideal response?

Computer Science & Information Technology

In mail merge, a placeholder that represents specific information in a data source is a merge:

A) entry. B) field. C) source. D) record.

Computer Science & Information Technology