Multiple Choice
A loss of _________ is the unauthorized disclosure of information.
A) confidentiality
B) authenticity
C) integrity
D) availability
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q2: Security implementation involves four complementary courses of
Q4: Hardware is the most vulnerable to attack
Q7: Release of message contents and traffic analysis
Q9: Data integrity assures that information and programs
Q18: The OSI security architecture focuses on security
Q32: A(n)_ is an attempt to learn or
Q33: The first step in devising security services
Q34: The assurance that data received are exactly
Q38: A(n) _ assessment is periodically assessing the
Q39: Many security administrators view strong security as