This helps in identifying the origin of information and authentic user. This referred to here as __________
(a) Confidentiality
(b) Integrity
(c) Authenticity
(d) Availability
I have been asked this question in a job interview.
The origin of the question is Elements of Security in chapter Cyber Security of Cyber Security
Select the correct answer from above options
Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,