in Education by
Data integrity gets compromised when _____ and _____ are taken control off. (a) Access control, file deletion (b) Network, file permission (c) Access control, file permission (d) Network, system I have been asked this question in an online quiz. This is a very interesting question from Elements of Security in portion Cyber Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
The correct choice is (c) Access control, file permission Easiest explanation: The two key ingredients that need to be kept safe are: access control & file permission in order to preserve data integrity.

Related questions

0 votes
    ________ is an attack technique occurs when excess data gets written to a memory block. (a) Over buffering (b) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    ___________ ensures the integrity and security of data that are passing over a network. (a) Firewall (b) Antivirus ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    When integrity is lacking in a security system, _________ occurs. (a) Database hacking (b) Data deletion (c) Data ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Which among the following is not a symptom of your system compromised with adware? (a) Website links ... for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    When you use the word _____ it means you are protecting your data from getting disclosed. (a) Confidentiality (b) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    When there is an excessive amount of data flow, which the system cannot handle, _____ attack takes place. (a) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    When you book online tickets by swiping your card, the details of the card gets stored in ______ (a) database ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
0 votes
    Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental? (a) They help ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Activate _____________ when you're required it to use, otherwise turn it off for security purpose. (a) ... for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Predict and analyze the tactics of competitors from data taken out from online data sources is a crime. (a) True ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 2, 2021 in Education by JackTerrance
0 votes
    ________ needs some control for data flow on each and every logical port. (a) Antivirus (b) Network firewall (c) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
...