Match the following security terms on the left with the definitions on the right

1. Confidentiality a. the base security configuration selected by an organization
2. Integrity b. the practice of using multiple layers of security between data and the resources on which it resides and possible attackers
3. Availability c. ensuring that data is accessible when and where it is needed
4. Default stance d. prevents the disclosure of data or information to unauthorized entities
5. Defense in depth e. ensures that data is protected from unauthorized modification or data corruption

1-d, 2-e, 3-c, 4-a, 5-b

Computer Science & Information Technology

You might also like to view...

The Reviewing task pane and the Revisions group help you review each comment in a reviewed presentation.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

If you want a sound to play continuously for a period of time, select the ____ sound setting and enter a number in the Repeat text box that specifies how many times you want the sound to play.

A. Loop B. Start Sync C. End Sync D. Repeat

Computer Science & Information Technology