Which one of these is NOT one the three pillars of security in the CIA triangle?

a. Confidentiality
b. Integrity
c. Availability
d. Authentication

Answer D.

Computer Science & Information Technology

You might also like to view...

Forms are bound to the table in which the records are stored

Indicate whether the statement is true or false

Computer Science & Information Technology

OS X uses the ____ file system

A) HFS+ B. NTFS C. exFat D. ext4

Computer Science & Information Technology