What are the two things that a system needs to do to provide confidentiality?
What will be an ideal response?
For a system to provide confidentiality, it needs to do two things:
1) Ensure that information maintains its privacy by limiting authorized access to resources
2) Block unauthorized access to resources
You might also like to view...
Which of the following is a disadvantage of the Cisco ASA 5500 series firewall?
A) It does not include an advanced firewall. B) It does not include IDS/IPS. C) It does not include unified communications security. D) It requires at least moderate skill to configure and administer.
What are the port numbers for FTP - File Transfer Protocol?
What will be an ideal response?
Systems development typically starts with a _____.?
A. ?feasibility study, followed by a systems request, which includes a preliminary investigation B. ?systems request, followed by a preliminary investigation, which includes a feasibility study C. ?preliminary investigation, followed by a feasibility study, which includes a systems request D. ?feasibility study, followed by a preliminary investigation, which includes a systems request
What is multifactor authentication, and what are some examples?
What will be an ideal response?