In computer security, ……………………. means that computer
system assets can be modified only by authorized parities.
 a) Confidentiality
 b) Integrity
 c) Availability
 d) Authenticity

1 Answer

Answer :

b) Integrity

Related questions

Description : In computer security, ……………………. means that computer system assets can be modified only by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity

Last Answer : B) Integrity

Description : In computer security, __________means that computer system assets can be modified only by authorized parities. i) Confidentiality ii) Integrity iii) Availability iv) Authenticity

Last Answer : ii) Integrity

Description : In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. a) Confidentiality b) Integrity c) Availability d) Authenticity

Last Answer : a) Confidentiality

Description : In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity

Last Answer : A) Confidentiality

Description : Prevention of disclosure of information to unauthorized persons is __________ A. Confidentiality B. Integrity C. Availability D. None of the above

Last Answer : A. Confidentiality

Description : In IT, means that the data available in the database is both accurate and consistent. (1) Data Security (2) Data Availability (3) Data Binding (4) Data Integrity

Last Answer : Data Integrity

Description : During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Integrity b. Security c. Confidentiality d. All the above

Last Answer : d. All the above

Description : .............. requires that data should be made available to only authorized users. A) Data integrity B) Privacy C) Security D) None of the above

Last Answer : C) Security

Description : How to maintain the confidentiality and authenticity of a business idea?

Last Answer : Secrecy. Don't tell people stuff unless you really have to. Only tell it to people you trust. Limit the number of people you tell stuff. Don't get any extra staff unless you really need to. It ... take notes in meeting but they're just another way info can leak. Consider making everyone sign NDA's.

Description : What is A stands in CIA of smart card? a. auditing b. authenticity c. authorized d. None of the above

Last Answer : b. authenticity

Description : If a professional accountant is billing an audit client a number of hours greater than those actually worked, which of the following fundamental principles is likely violated? a. Objectivity b. Integrity c. Professional due care d. Confidentiality

Last Answer : Integrity

Description : Which fundamental principle is seriously threatened by an engagement that is compensated based on the net proceeds on loans received by the client from a commercial bank? a. Integrity b. Objectivity c. Professional behavior d. Confidentiality

Last Answer : Objectivity

Description : A professional accountant is likened to a prudent father to his son. This relates to what fundamental principle? a. Professional competence and due care b. Confidentiality c. Integrity d. Objectivity

Last Answer : Professional competence and due care

Description : There are fundamental principles that the professional accountant has to observe when performing assurance engagements. The requirement of which principle is of particular importance in an assurance ... the intended user? a. Integrity b. Confidentiality c. Professional competence d. Objectivity

Last Answer : Objectivity

Description : Which factor determines when your IT system will be available for knowledge worker to access? a) Availability b) Accessibility c) Reliabilityd) None of the above

Last Answer : a) Availability

Description : Which one is a communication channel threat? a) Sniffer programs b) Cyber vandalism c) Integrity threats d) All of the above

Last Answer : d) All of the above

Description : What is not a role of encryption? a)It is used to protect data from unauthorized access during transmission. b)It is used to ensure user authentication c)It is used to ensure data integrity d)It is used to ensure data corruption does not happens

Last Answer : d)It is used to ensure data corruption does not happens

Description : The type of threats on the security of a computer system or network are …………………….. i) Interruption ii)Interception iii) Modification iv) Creation v)Fabrication a) i, ii, iii and iv only b) ii, iii, iv and v only c) i, ii, iii and v only d) All i, ii, iii, iv and v

Last Answer : c) i, ii, iii and v only

Description : What is the name of instrument used for measuring earthquake intensity? a. Modified Mercalli Scale b. Metrological scale c. Vernier scale d. Barometer

Last Answer : a. Modified Mercalli Scale

Description : Within gender studies, the term patriarchy refers to a social system wherein a. Men dominate over women. b. Greater rights given to men. c. Resources like land and other assets are controlled by men. d. All of the above.

Last Answer : d. All of the above.

Description : What is Food security means: (a) availability of food (b) accessibility of food (c) affordability of food (d) all the above

Last Answer : (d) all the above

Description : Food Authenticity means a) The food should match the description. b) The food should taste good c) It should be cheap. d) None of the mentioned

Last Answer :  The food should match the description

Description : Food authenticity means e)The food should match the description c) The food should taste good f)It should be cheap d) None of the above

Last Answer : The food should match the description

Description : Intruders is a most common security threat which referred as? a)Account Access b)Data Access c)Hacker or Cracker d)Computer Access

Last Answer : c)Hacker or Cracker

Description : ________ means that the participant's identity, although known to the researcher, is not revealed to anyone outside of the researcher and his or her staff. a. Anonymity b. Confidentiality

Last Answer : b. Confidentiality

Description : One aspect that has to be dealt with by the integrity subsystem is to ensure that only valid values can be assigned to each data items. This is referred to as A) Data Security B) Domain access C) Data Control

Last Answer : C) Data Control

Description : The security furnished by an official will be liable to forfeiture by a) Director General b) Head of the circle c) Any officer authorized by DG Post d) Both the A & C

Last Answer : d) Both the A & C

Description : A combination of software and information designed to provide security and information for payment is called - a. digital wallet b. pop up ad c shopping cart d. encryption

Last Answer : d. encryption

Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. Pop up ad c. Shopping cart d. Encryption

Last Answer : a. digital wallet

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryption b. Decryption c. firewall d. all the above

Last Answer : d. all the above

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryptionb. Decryption c. firewall d. all the above

Last Answer : d. all the above

Description : The main thrust of ‘Copenhegen Summit’ was: a) Food Security b) Air Pollution c) Rehabilitation d) Climate Change

Last Answer : d) Climate Change

Description : The right to life, liberty and security of person under the ICCPR is contained in a. Article 1 b. Article 2 c. Article 3 d. Article 4

Last Answer : c. On 20 th November 1989

Description : What is the myth of protection? [A] It characterizes men as protective and women as protected [B] It is used to justify and shape material security policies [C] It has been challenged by changing gender role in contemporary warfare [D] All of the above

Last Answer : [D] All of the above

Description : n processes, access control implements a a)Security Policy b)Access Policy c)Control Policy d)Check Policy

Last Answer : a)Security Policy

Description : Use of Full Body Scanner at Airport is an issue between a. Security and Copyright b. Copyright and Privacy c. Security and Privacy d. None of the above

Last Answer : c. Security and Privacy

Description : Empowerment of woman, in its simplest form, means the redistribution of power that challenges a. Patriarchal ideology. b. Culture. c. Economic system. d. None of the above.

Last Answer : a. Patriarchal ideology.

Description : Which security provision is used to ensure data integrity and authentication? -Technology

Last Answer : A digital signature helps the user to ensure data integrity and authentication.

Description : Write down the major issues of security and integrity of information. -Technology

Last Answer : There are three major issues as follows:1. Confidentiality2. Integrity3. Availability

Description : The term is used to represent_“information is accurate and complete” (a) Security (b) Integrity (c) Completeness (d) Counterfeiting -Technology

Last Answer : (b) Integrity means information is accurate and complete.

Description : Which one is not a security issue of mobile computing? a) Integrity b) Legitimate c) Accountability d) Insufficient bandwidth

Last Answer : Insufficient bandwidth

Description : __________ means sharing a program with someone who is not authorized by the license agreement to use it. A. Softloading B. Hard Disk loading C. Internet Downloading D. Renting

Last Answer : D. All of the above

Description : AML means a) Authorized monitory limitation b) Advance Mail Line c) Anti money laundering d) None of these

Last Answer : c) Anti money laundering

Description : Unauthorized communication of information means and include:- a) To which he is not authorized to have access. b) Which he is not authorized to keep in his personal custody c) Both A & B d) None of these

Last Answer : c) Both A & B

Description : a. Availability of food b. Accessibility of food c. Availability and accessibility of food to all at all times. d. Availability, accessibility and affordability of food to all at all the times.What does food security mean?

Last Answer : d. Availability, accessibility and affordability of food to all at all the times.

Description : 5. What is the Primary Objectives of Digital Forensic for Business and Industry A. Availability of service B. Continuity of operation C. Prosecution D. Security

Last Answer : A. Availability of service

Description : . What is the Primary Objectives of Digital Forensic for Business and Industry? a. Availability of service b. Prosecution c. Continuity of operation d. Security

Last Answer : a. Availability of service