Controlling access to information systems and associated networks is necessary for the preservation of their:
A.
Authenticity, confidentiality, integrity and availability.
B.
Integrity and availability.
C.
Confidentiality, integrity and availability.
D.
Authenticity, confidentiality and availability.
Explanation:
Reference: Security + (SYBEX) page 22