Which two principles of the CIA triad can be violated by a fabrication attack?

A. Integrity and authenticity
B. Integrity and availability
C. Confidentiality and integrity
D. Confidentiality and availability

Ans: B. Integrity and availability

Computer Science & Information Technology

You might also like to view...

The most popular active social bookmarking services among U.S. users include Delicious, itList, Digg, reddit, and StumbleUpon

Indicate whether the statement is true or false

Computer Science & Information Technology

Work recovery time (WRT) is the difference between RTO and MTD

Indicate whether the statement is true or false.

Computer Science & Information Technology