The three elements of the Security Triad are confidentiality, integrity, and availability

Indicate whether the statement is true or false

True Understanding each of these elements goes a long way tohelping you understand the goals of many security programs and security controls.

Computer Science & Information Technology

You might also like to view...

Queries are most often created as a basis for a report, but query results can be printed like any other table of data

Indicate whether the statement is true or false

Computer Science & Information Technology

The Repeat Count and ________ are action arguments that are used when the macro should be run more than one time

A) Echo B) RunMacro C) Repeat Expression D) DisplayHourglassPointer

Computer Science & Information Technology