in Technology by

In computer security _______ means that computer system assets can be modified only by authorized parities.

       A. integrity

       B. confidentiality

       C. authenticity

       D. availability

1 Answer

0 votes
by

In computer security _______ means that computer system assets can be modified only by authorized parities.

Answer : integrity

Related questions

0 votes
    In computer security _______ means that the information in a computer system only be accessible for reading by ... . integrity B. confidentiality C. authenticity D. availability...
asked Mar 12, 2023 in Technology by JackTerrance
0 votes
    ______________ requires that data should be made available to only authorized users. (a) Data integrity (b ... Database Interview Questions and Answers for Freshers and Experience...
asked Oct 11, 2021 in Education by JackTerrance
0 votes
    _______ of information means, only authorised users are capable of accessing the information. (a) Confidentiality (b) ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    _______ means that data used during the execution of a transaction cannot be used by a second transaction ... Database Interview Questions and Answers for Freshers and Experience...
asked Oct 11, 2021 in Education by JackTerrance
0 votes
    _______ means that data used during the execution of a transaction cannot be used by a second transaction ... Schemes topic in section Concurrency Control of Database Management...
asked Oct 10, 2021 in Education by JackTerrance
0 votes
    The device which is used as a means of communication and the computer system is what Select the correct answer from above options...
asked Dec 24, 2021 in Education by JackTerrance
0 votes
    Que. The term Operation system means (a) A Set of programs which controls computer working. (b) The way ... disk drive operates. Select the correct answer from above options...
asked Nov 30, 2021 in Education by JackTerrance
0 votes
    Which of the following can be defined as a family of activities for enhancing security by identifying objectives and ... of the options (3)Dynamic Analysis (4)Static Analysis...
asked May 19, 2021 in Technology by JackTerrance
0 votes
0 votes
    How can I clone or deep copy an object so that the cloned object can be modified without any changes being reflected in the original object?...
asked Jan 15, 2021 in Technology by JackTerrance
0 votes
    The ___________ policy, allows the system to write modified blocks to disk even if the transactions that ... Database Interview Questions and Answers for Freshers and Experience...
asked Oct 11, 2021 in Education by JackTerrance
0 votes
    _______ means that the object is inserted as a copy of the original document. Select the correct answer from above options...
asked Dec 14, 2021 in Education by JackTerrance
0 votes
    _______________ attacks always need physical access to the system that is having password file or the hacker ... Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
...