Which file action implements the principle of confidentiality from the CIA triad?

A. Compression
B. Hash
C. Backup
D. Encryption

Answer: D. Encryption

Computer Science & Information Technology

You might also like to view...

How would you justify using cloud computing?

a. less network traffic b. sharing a network could reduce overall costs c. new technology d. government pressure

Computer Science & Information Technology

Choose the best answer below to the following question: Is the following CSS code valid?

``` table { border: 2px #000000 solid; border-spacing: 0; } ``` a. Yes. b. No, there is no border-spacing property. c. No, there is no border property. d. No, 0 is not a valid value for the border-spacing property.

Computer Science & Information Technology