Which file action implements the principle of confidentiality from the CIA triad?
A. Compression
B. Hash
C. Backup
D. Encryption
Answer: D. Encryption
Computer Science & Information Technology
You might also like to view...
How would you justify using cloud computing?
a. less network traffic b. sharing a network could reduce overall costs c. new technology d. government pressure
Computer Science & Information Technology
Choose the best answer below to the following question: Is the following CSS code valid?
``` table { border: 2px #000000 solid; border-spacing: 0; } ``` a. Yes. b. No, there is no border-spacing property. c. No, there is no border property. d. No, 0 is not a valid value for the border-spacing property.
Computer Science & Information Technology