________ is the assurance that the systems responsible for delivering, storing, and processing information are accessible when required by authorized users.
A. Integrity
B. Confidentiality
C. Availability
D. Authenticity
Answer: C. Availability
Computer Science & Information Technology
You might also like to view...
Which of the following is the first field of the /etc/passwd file?
A. UID B. username C. GECOS D. GID
Computer Science & Information Technology
In the context of in-house software development options, companies that develop software for sale are called _____.
A. software stockers B. software distributers C. software vendors D. software dealers
Computer Science & Information Technology