Multiple Choice
Match each item with a statement below.
-Information remains whole, complete, and uncorrupted.
A) data custodian
B) Trojan horse
C) integrity
D) back door
E) balance
F) worm
G) accuracy
H) data owner
I) confidentiality
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q15: The _ is based on a model
Q16: Describe the importance of enabling the safe
Q17: In a _ attack, the attacker sends
Q18: The most common Intellectual Property breach is
Q19: Match each item with a statement below.<br>-Information
Q21: What are the responsibilities of a data
Q22: To achieve the maximum confidentiality and integrity
Q23: Provide an example of a social engineering
Q24: In a(n) _ attack, the attacker monitors
Q25: _ is a technique used to gain