1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olga55 [171]
3 years ago
5

A company is experiencing overwhelming visits to a main web server. The IT department is developing a plan to add a couple more

web servers for load balancing and redundancy. Which requirement of information security is addressed by implementing the plan?
(A) integrity
(B) scalability
(C) availability
(D) confidentiality
Computers and Technology
2 answers:
Varvara68 [4.7K]3 years ago
5 0
The answer is C) Availability.

Although the company is addressing scalability by adding more servers, the question is asking for security requirement. Therefore we need to choose one of the principles from CIA triad which includes confidentiality, integrity, and availability.

Integrity involves keeping the data accurate and confidentiality involves keeping the data between the sender and intended recipient(s). That being said, scalability and availability are the possible answers.

C) Availability is the best answer because it is part of the CIA triad.

Note: Another resource to look at for cyber security principles would be the Parkerian Hexad.
Gnoma [55]3 years ago
3 0

Explanation:

The three goals of information security are:

- integrity

- availability

- confidentiality

Since adding additional servers help relieve overloading by load balancing and redundancy, it will address availability AND integrity.

However, the major issue at hand is solving the overwhelming visits to the server, the plan address the aspect of availability.

You might be interested in
When mysql automatically converts one data type to another, itâs known as a/an ______________________ conversion?
lubasha [3.4K]
<span>MySQL is an open-source relational database management system (RDBMS)</span>
When MySQL automatically converts one data type to another, is known as an implicit conversion. Implicit conversion refers to the mixing and matching data types within the same operation. Example for implicit conversion is when MySQL automatically converts numbers to strings and vice versa. 
5 0
3 years ago
_____ is when a person connects their location to photos that are posted online.
Margaret [11]
B) friend tagging is when
4 0
3 years ago
Read 2 more answers
A tool that helps teachers conduct online classes​
sergiy2304 [10]

Answer:

scrotive

project

thinglink

TeD -Ed

6 0
2 years ago
Which two features could be added to a game using an "if () then" block?
xxTIMURxx [149]

The two features that could be added to a game using an "if () then" block are c. if the player touches a wall, it turns around and moves back 5 and d.

<h3>What does the If Then block mean?</h3>

The If-Then block is understood to be the output certainly considered one among given values, this is because of the fee of a Boolean enter.

Note that the entry fee could be very essential and as such, The functions will be introduced to a sport the use of an "if () then " block are: Using nested If-Then blocks. • Checks the particular Bid amount for the instrument.

Learn greater approximately game from :

brainly.com/question/1786465

#SPJ1

3 0
1 year ago
Select the correct answer.
Naddika [18.5K]

Answer:

E

Explanation:

4 0
3 years ago
Other questions:
  • The _____ contains a series of sections designed to prepare students for the ACT
    14·2 answers
  • "The term ____ refers to the programs or instructions used to tell the computer hardware what to do."
    6·1 answer
  • Write an if else statement that assigns 0 to the variable b and assigns 1 to the variable c if the variable a is less than 10. O
    5·1 answer
  • What would be a reason for using a workstation rather than a personal computer?
    7·1 answer
  • Which of the following file formats cannot be imported using Get &amp; Transform?
    6·1 answer
  • List of rules for expert systems​
    6·1 answer
  • What are the five Ws?<br> (I don’t even know what this means)
    5·2 answers
  • Cómo fue posible que los alemanes exterminando seres humanos​
    11·1 answer
  • Of the 5 factors that should be evaluated when assessing information's quality (Validity, Reliability, Accuracy, Timeliness, and
    6·1 answer
  • Which tool can you use to display hardware utilization statistics that tell you about the operation of your computer?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!