Controlling access to information systems and associated networks is necessary for the preservation of their:

Controlling access to information systems and associated networks is necessary for the
preservation of their:

Controlling access to information systems and associated networks is necessary for the
preservation of their:

A.
authenticity, confidentiality and availability

B.
authenticity, confidentiality, integrity and availability.

C.
confidentiality, integrity and availability

D.
integrity and availability

Explanation:

The design goals of a security topology must deal with issues of confidentiality, integrity,
availability and accountability. You will often see the confidentiality, integrity and availability
referred to as the CIA of network security. The accountability is equally important.
Reference:
Mike Pastore and Emmett Dulaney , Security+ Study Guide , 2nd Edition, Alameda , Sybex , 2004,
p 22



Leave a Reply 0

Your email address will not be published. Required fields are marked *