Controlling access to information systems and associated networks is necessary for the
preservation of their:
A.
authenticity, confidentiality and availability
B.
authenticity, confidentiality, integrity and availability.
C.
confidentiality, integrity and availability
D.
integrity and availability
Explanation:
The design goals of a security topology must deal with issues of confidentiality, integrity,
availability and accountability. You will often see the confidentiality, integrity and availability
referred to as the CIA of network security. The accountability is equally important.
Reference:
Mike Pastore and Emmett Dulaney , Security+ Study Guide , 2nd Edition, Alameda , Sybex , 2004,
p 22