Multiple Choice
The process of determining what the authenticated entity is allowed to access and what operations it is allowed to perform is known as
A) integrity.
B) availability.
C) authorization.
D) nonrepudiation.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q31: A strategy that views EC security as
Q32: Girlfriend Trojans come to life when computer
Q33: A digital envelope is the combination of
Q34: The CyberCop Portal analyzes and combats cyberthreats
Q35: Protection of the U.S.computer networks is in
Q37: A method of evaluating the security of
Q38: Which of the following refers to the
Q39: Due care in EC are those actions
Q40: A malicious hacker who may represent a
Q41: A macro virus or macro worm is