1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sveta_85 [38]
3 years ago
5

The "A" in the CIA triad stands for "authenticity". True False

Computers and Technology
1 answer:
mihalych1998 [28]3 years ago
8 0

Answer: False, the "A" in the CIA triad stands for <em>availability</em><em>.</em>

The CIA triad also know as the Confidentiality, integrity and availability triad, is known as a model which is designed in order to implement and enforce policies in regards to information security. This model is also referred as the availability, integrity and confidentiality model i.e AIC triad. This is done in order to avoid confusion with Central Intelligence Agency i.e. CIA.

You might be interested in
What is commodity? explain
timama [110]
A raw material or primary agricultural product that can be bought and sold, such as copper or coffee.
6 0
3 years ago
PLEASE HELP!
lawyer [7]

To block link that keeps popping up everywhere, one can:

  • Use your browser and click on block Pop-ups  in settings
  • Install an antivirus.

<h3>How do I stop pop-up links?</h3>

One can do so if they Manage the pop-up by blocking it in the Chrome browser where they:

  • Click on Settings from the Chrome menu.
  • input 'pop' in the search bar.
  • Select Site Settings  and then select Pop-ups and redirects.
  • Here one can toggle the Pop-ups and redirections option to Blocked them.

Therefore, To block link that keeps popping up everywhere, one can:

  • Use your browser and click on block Pop-ups  in settings
  • Install an antivirus.

Learn more about pop up link from

brainly.com/question/13666301

#SPJ1

4 0
2 years ago
Pda bkhhksejc pnwjoynelp dwo xaaj ajykzaz ywj ukq zaykza ep???<br><br><br> The Key Value is 22
Sindrei [870]

Answer:

The following transcript has been encoded can you decode it???

Explanation:

It is a ceasar cipher. Shift every letter in the alphabet by 22 positions.

3 0
4 years ago
Universal Container wants to understand all of the configuration changes that have been made over the last 6 months. Which tool
rosijanka [135]

Answer:

Set up audit trail

Explanation:

The administrator should set up an audit trail in order to get this information.

An audit trail would give him the record of all the configuration changes that have been made in a file or a database in the last 6 months.

Audit trails can be manual or electronic. It provides history and also documentation support. It can authenticate security and also help to mitigate challenges.

4 0
3 years ago
A consumer is the name for:
hodyreva [135]

Answer:

A. a person who buys and uses products and services

7 0
3 years ago
Read 2 more answers
Other questions:
  • A simple operating system supports only a single directory but allows it to have arbitrarily many files with arbitrarily long fi
    13·1 answer
  • (Statistics) Write a program that includes two functions named calcavg() and variance(). The calcavg() function should calculate
    10·1 answer
  • Write a C++ program that allows the user to enter double values. Display one of two messages: "The first number you entered is l
    9·1 answer
  • ServletConfig defines a set of methods that a servlet uses tocommunicate with its servlet container.
    5·1 answer
  • 2. What is a cap? (0.5 points)
    9·1 answer
  • To make IPv4 addresses a little easier for human beings to understand, the 32-bit binary addresses are represented by dotted dec
    9·1 answer
  • Which command can be used to find errors on a hard drive​
    6·1 answer
  • In attempts to improve their contribution to the environment a company decides to adapt green computing. Which of these techniqu
    13·1 answer
  • The memory used by the CPU to temporarily hold data while processing is called _______. random access memory central processing
    5·1 answer
  • What are the importance of computer software​
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!