The three cornerstones of voice network system security are availability,

a. circumvention, and confidentiality.
b. circumvention, and disclosure.
c. confidentiality, and integrity.
d. disclosure, and integrity.

Ans: c. confidentiality, and integrity.

Computer Science & Information Technology

You might also like to view...

When working with SmartArt Graphic types, a ________ shows non-sequential information.

a. List b. Process c. Cycle d. Hierarchy

Computer Science & Information Technology

The buttons under ________ on the Design tab are used to run, test, or modify a macro

Fill in the blank(s) with correct word

Computer Science & Information Technology