1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olga55 [171]
3 years ago
5

A company is experiencing overwhelming visits to a main web server. The IT department is developing a plan to add a couple more

web servers for load balancing and redundancy. Which requirement of information security is addressed by implementing the plan?
(A) integrity
(B) scalability
(C) availability
(D) confidentiality
Computers and Technology
2 answers:
Varvara68 [4.7K]3 years ago
5 0
The answer is C) Availability.

Although the company is addressing scalability by adding more servers, the question is asking for security requirement. Therefore we need to choose one of the principles from CIA triad which includes confidentiality, integrity, and availability.

Integrity involves keeping the data accurate and confidentiality involves keeping the data between the sender and intended recipient(s). That being said, scalability and availability are the possible answers.

C) Availability is the best answer because it is part of the CIA triad.

Note: Another resource to look at for cyber security principles would be the Parkerian Hexad.
Gnoma [55]3 years ago
3 0

Explanation:

The three goals of information security are:

- integrity

- availability

- confidentiality

Since adding additional servers help relieve overloading by load balancing and redundancy, it will address availability AND integrity.

However, the major issue at hand is solving the overwhelming visits to the server, the plan address the aspect of availability.

You might be interested in
How can you employ one of the most powerful interactive business tools on the Internet today?
Dovator [93]

Answer:start a blog. I read the book.

Explanation:

7 0
4 years ago
How many of yall are willing to subscribe to my channel called "Space Juice" with around 245 subs?!​
Sliva [168]

Answer:

I will

Explanation:

4 0
3 years ago
Jeremy is designing a website for a florist. He intends to discuss the web design with his client. Which tool should Jeremy use
stiv31 [10]

Answer:

C.  layout of each page with its respective elements

Explanation:

A layout  of each page with its respective elements will give the client a good idea of the final product and help him confirm his desires/requests towards the creation of the Web site.  Most people are visual, especially about things they don't fully understand, so a clear and visual representation is best.

<u>A. Bulleted lists and titles</u>... won't give the idea of the full layout of the Web site.

<u>B. chart depicting</u>....  that's more a tool for the programmer than the client, although user flow is important, it isn't as much as the visual aspect of each page.

<u>D. pictures and screenshots of websites of other florists..</u>. That could be a useful aid on the first contact, but the question implied the Web site is already in progress... so that wouldn't help much.

<u>E.  programming code for the website</u>, absolutely not, the client hired Jeremy not to have to deal with that.

5 0
4 years ago
here are pros and cons for doing temp work. Please select the best answer from the choices provided T F
Brut [27]

Answer:

Hello! the answer should be true, I hope i got here in time.  

Explanation:

6 0
3 years ago
Read 2 more answers
(Type the correct answer in the box.)
mihalych1998 [28]

1. If in MS Access, Click on Query design, select the required Table.

 In Field select required field, in this case Select [Name of Plants]. Click on Order and set it as Ascending / Descending.

2. If you want to write a Query that it will look like this

SELECT MedicinalPlants.Name of the plantsFROM MedicinalPlantsORDER BY MedicinalPlants.Name of the Plants;

Read more on Brainly.com - brainly.com/question/3433328#readmore

4 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following would be a tradeoff of a scientific advancement that enables us to catch fish from the ocean faster than
    5·1 answer
  • (1) In Tamara's science class, the students are learning Which sentence shows an action that is extrinsically
    7·1 answer
  • __________ is a protocol used by e-mail clients to download e-mails to your computer.
    14·1 answer
  • A byte is made up of 8 bits (binary digits). You have a programming language that uses one byte to represent characters and are
    5·1 answer
  • Green field country is planning to conduct a cricket match between two teams A and B. a large crowd is expected in the stadium a
    6·1 answer
  • What is your favourite video game??​
    5·2 answers
  • A production house needs an operating system that captures saves and generates information within a specific time. Which type of
    11·1 answer
  • A(n) _______ gate provides an output of 1 if either or both inputs are 1.
    14·2 answers
  • Does the security burden fall primarily on the user? On
    10·1 answer
  • If you want to change the name of a folder that stores Word documents, what should you do before changing the
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!