Multiple Choice
The assurance that data received are exactly as sent by an authorized entity is __________.
A) authentication
B) access control
C) data confidentiality
D) data integrity
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q2: Security implementation involves four complementary courses of
Q4: Hardware is the most vulnerable to attack
Q7: Release of message contents and traffic analysis
Q9: Data integrity assures that information and programs
Q32: A(n)_ is an attempt to learn or
Q33: A loss of _ is the unauthorized
Q33: The first step in devising security services
Q38: A(n) _ assessment is periodically assessing the
Q39: Many security administrators view strong security as
Q39: Masquerade,falsification,and repudiation are threat actions that cause