The three elements of the Security Triad are confidentiality, integrity, and availability
Indicate whether the statement is true or false
True Understanding each of these elements goes a long way tohelping you understand the goals of many security programs and security controls.
Computer Science & Information Technology
You might also like to view...
Queries are most often created as a basis for a report, but query results can be printed like any other table of data
Indicate whether the statement is true or false
Computer Science & Information Technology
The Repeat Count and ________ are action arguments that are used when the macro should be run more than one time
A) Echo B) RunMacro C) Repeat Expression D) DisplayHourglassPointer
Computer Science & Information Technology