________ is the assurance that the systems responsible for delivering, storing, and processing information are accessible when required by authorized users.

A. Integrity
B. Confidentiality
C. Availability
D. Authenticity

Answer: C. Availability

Computer Science & Information Technology

You might also like to view...

Which of the following is the first field of the /etc/passwd file?

A. UID B. username C. GECOS D. GID

Computer Science & Information Technology

In the context of in-house software development options, companies that develop software for sale are called _____.

A. software stockers B. software distributers C. software vendors D. software dealers

Computer Science & Information Technology