in Technology by

In computer security _______ means that computer system assets can be modified only by authorized parities.

       A. integrity

       B. confidentiality

       C. authenticity

       D. availability

1 Answer

0 votes
by

In computer security _______ means that computer system assets can be modified only by authorized parities.

Answer : integrity

Related questions

0 votes
    In computer security _______ means that the information in a computer system only be accessible for reading by ... . integrity B. confidentiality C. authenticity D. availability...
asked Mar 11 in Technology by JackTerrance
0 votes
    ______________ requires that data should be made available to only authorized users. (a) Data integrity (b ... Database Interview Questions and Answers for Freshers and Experience...
asked Oct 10, 2021 in Education by JackTerrance
0 votes
    _______ means that data used during the execution of a transaction cannot be used by a second transaction ... Database Interview Questions and Answers for Freshers and Experience...
asked Oct 10, 2021 in Education by JackTerrance
0 votes
    _______ means that data used during the execution of a transaction cannot be used by a second transaction ... Schemes topic in section Concurrency Control of Database Management...
asked Oct 10, 2021 in Education by JackTerrance
0 votes
    _______ of information means, only authorised users are capable of accessing the information. (a) Confidentiality (b) ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    The device which is used as a means of communication and the computer system is what Select the correct answer from above options...
asked Dec 23, 2021 in Education by JackTerrance
0 votes
    Que. The term Operation system means (a) A Set of programs which controls computer working. (b) The way ... disk drive operates. Select the correct answer from above options...
asked Nov 30, 2021 in Education by JackTerrance
0 votes
    Which of the following can be defined as a family of activities for enhancing security by identifying objectives and ... of the options (3)Dynamic Analysis (4)Static Analysis...
asked May 19, 2021 in Technology by JackTerrance
0 votes
    _______________ attacks always need physical access to the system that is having password file or the hacker ... Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    computer is an electronic device and can only understand the on and off state of a switch, this two state are ... very very very urgent Select the correct answer from above options...
asked Nov 30, 2021 in Education by JackTerrance
0 votes
    The ___________ policy, allows the system to write modified blocks to disk even if the transactions that ... Database Interview Questions and Answers for Freshers and Experience...
asked Oct 10, 2021 in Education by JackTerrance
0 votes
    _______ means that the object is inserted as a copy of the original document. Select the correct answer from above options...
asked Dec 13, 2021 in Education by JackTerrance
0 votes
    After reading the chapter, I know these points: I know that data gets highlighted after being selected. I know ... entry and editing. Select the correct answer from above options...
asked Nov 26, 2021 in Education by JackTerrance
...