If an attacker breaks into a corporate database and steals critical files then deletes the files, against what security goal/s is this attack aimed
A. Confidentiality and Availability
B. Confidentiality only
C. Integrity and Confidentiality
D. Availability and Integrity
A. Confidentiality and Availability
Computer Science & Information Technology
You might also like to view...
The purpose of ________ is to determine the basic parameters within which the risk assessment will be conducted and then to identify the assets to be examined.
A. establishing the context B. control C. risk avoidance D. combining
Computer Science & Information Technology
_________ checks whether the CheckBox chk is selected.
a. chk.getSelected() b. chk.selected() c. chk.isSelected(). d. chk.select()
Computer Science & Information Technology