Which aspect of the CIA triad is violated by an unauthorized database rollback or undo?

A. Availability
B. Identification
C. Integrity
D. Confidentiality

Answer: C. Integrity

Computer Science & Information Technology

You might also like to view...

Public key cryptography is also called ____________________ encryption.?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

How does longitudinal parity work??

What will be an ideal response?

Computer Science & Information Technology