Jane, an IT security technician working at a bank, has implemented encryption between two locations. Which of the following security concepts BEST exemplifies the protection provided by this example?
A. Integrity
B. Confidentiality
C. Cost
D. Availability
Answer: B. Confidentiality
You might also like to view...
A data bar is a bar whose width represents a cell's value compared to the other cells' values
Indicate whether the statement is true or false
What are three configuration steps are required to mount an NFS datastore in vSphere? (Choose three)
a. On virtual machines running Microsoft Windows, increase the value of the SCSI TimeoutValue parameter to allow Windows to better tolerate delayed I/O resulting from path failover. b. Configuring VMkerner Port Binding c. On each ESXi host, configure a VMkernel Network port for NFS traffic d. On the NFS server, configure an NFS volume and export it to be mounted on the ESXi hosts. e. If you plan to use Kerberos authentication with the NFS 4.1 datastore, configure the ESXi hosts for Kerberos Authenticaiton