Answer:
confidentiality, integrity, availability
Explanation:
Confidentiality: Data and information assets must be confined to people who have authorized access and not disclosed to others
Integrity: Keeping the data intact, complete and accurate, and IT systems operational
Availability: An objective indicating that information or system is at disposal of authorized users when needed.
Social Engineering is the art of eliciting sensitive information from people by tricking them. Like through phishing, fake emails that contain a virus and fake programs. They get your password or any other sensitive information by making you think the website/program is legit. That's why you should always make sure the new website/program you visited is safe.
Reverse Social Engineering is, on the other hand, where the initial attacker becomes attacked. Or the victim redirects the attacker to someone who can counter the attacker. E.g attackers call the front desk and ask for information X. Instead or giving him information X, front desk redirects the call to the security department. An example is where the attacker is fed false information. Law enforcement agencies often perform this attack.
Answer:
complex formatting feature enables you to represent text as colorful
visuals.
mark as brainliest
Answer:
D
Hope This Helps! Have A Nice Day!!