in Education by
_______ of information means, only authorised users are capable of accessing the information. (a) Confidentiality (b) Integrity (c) Non-repudiation (d) Availability I had been asked this question in a job interview. My query is from Elements of Security in chapter Cyber Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
The correct option is (d) Availability Easy explanation: Information seems useful only when right people (authorised users) access it after going through proper authenticity check. The key element availability ensures that only authorised users are able to access the information.

Related questions

0 votes
    Accessing computer without prior authorization is a cyber-crimes that come under _______ (a) Section 65 (b) Section 66 ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    ______ means the protection of data from modification by unknown users. (a) Confidentiality (b) Integrity (c) ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    A ___________ is a method in which a computer security mechanism is bypassed untraceable for accessing the ... Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
0 votes
    ________________ are unnecessary software which infiltrates user's system, spy on user's activities, stealing ... Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    There are _______ major ways of stealing email information. (a) 2 (b) 3 (c) 4 (d) 5 I have ... Security?,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    _______ technology is used for analyzing and monitoring traffic in network and information flow. (a) Cloud access security ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
0 votes
    Accessing Wi-Fi dishonestly is a cyber-crime. (a) True (b) False This question was posed to me in class ... Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
...