Which two principles of the CIA triad can be violated by a fabrication attack?
A. Integrity and authenticity
B. Integrity and availability
C. Confidentiality and integrity
D. Confidentiality and availability
Ans: B. Integrity and availability
Computer Science & Information Technology
You might also like to view...
The most popular active social bookmarking services among U.S. users include Delicious, itList, Digg, reddit, and StumbleUpon
Indicate whether the statement is true or false
Computer Science & Information Technology
Work recovery time (WRT) is the difference between RTO and MTD
Indicate whether the statement is true or false.
Computer Science & Information Technology