The CIA security triad consists of which three basic building blocks?

What will be an ideal response?


Confidentiality, integrity, and availability

Computer Science & Information Technology

You might also like to view...

What does the T represent in the following statement?

``` template < class T > ``` a. the name of the function template b. T stands for Template c. a generic data type that is used in a function template d. the int data type e. None of these

Computer Science & Information Technology

A technician replaces an older SCSI drive with a much larger SCSI drive. The system' s SCSI adapter card does not recognize the new drive. The driver for the SCSI adapter is up-to-date. Which of the following is the BEST action for the technician to take?

A. Check that the SCSI adapter is getting power. B. Format the SCSI drive with NTFS on another system before the installation. C. Check for a firmware update from the manufacturer of the SCSI adapter. D. Change the jumper settings on the SCSI adapter.

Computer Science & Information Technology

A secondary decision is always made by which selection structure?

A. inner B. nested C. alternative D. single-alternative

Computer Science & Information Technology

The National Institute of Standards and Technology selected the algorithm Lucifer in October 2000 as the basis for AES.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology