In computer security, …………………….. means that the
information in a computer system only be accessible for reading by authorized
parities.
a) Confidentiality
b) Integrity
c) Availability
d) Authenticity

1 Answer

Answer :

a) Confidentiality

Related questions

Description : In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity

Last Answer : A) Confidentiality

Description : In computer security, ……………………. means that computer system assets can be modified only by authorized parities. a) Confidentiality b) Integrity c) Availability d) Authenticity

Last Answer : b) Integrity

Description : In computer security, ……………………. means that computer system assets can be modified only by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity

Last Answer : B) Integrity

Description : In computer security, __________means that computer system assets can be modified only by authorized parities. i) Confidentiality ii) Integrity iii) Availability iv) Authenticity

Last Answer : ii) Integrity

Description : Prevention of disclosure of information to unauthorized persons is __________ A. Confidentiality B. Integrity C. Availability D. None of the above

Last Answer : A. Confidentiality

Description : In IT, means that the data available in the database is both accurate and consistent. (1) Data Security (2) Data Availability (3) Data Binding (4) Data Integrity

Last Answer : Data Integrity

Description : During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Integrity b. Security c. Confidentiality d. All the above

Last Answer : d. All the above

Description : .............. requires that data should be made available to only authorized users. A) Data integrity B) Privacy C) Security D) None of the above

Last Answer : C) Security

Description : How to maintain the confidentiality and authenticity of a business idea?

Last Answer : Secrecy. Don't tell people stuff unless you really have to. Only tell it to people you trust. Limit the number of people you tell stuff. Don't get any extra staff unless you really need to. It ... take notes in meeting but they're just another way info can leak. Consider making everyone sign NDA's.

Description : What is A stands in CIA of smart card? a. auditing b. authenticity c. authorized d. None of the above

Last Answer : b. authenticity

Description : If a professional accountant is billing an audit client a number of hours greater than those actually worked, which of the following fundamental principles is likely violated? a. Objectivity b. Integrity c. Professional due care d. Confidentiality

Last Answer : Integrity

Description : Which fundamental principle is seriously threatened by an engagement that is compensated based on the net proceeds on loans received by the client from a commercial bank? a. Integrity b. Objectivity c. Professional behavior d. Confidentiality

Last Answer : Objectivity

Description : A professional accountant is likened to a prudent father to his son. This relates to what fundamental principle? a. Professional competence and due care b. Confidentiality c. Integrity d. Objectivity

Last Answer : Professional competence and due care

Description : There are fundamental principles that the professional accountant has to observe when performing assurance engagements. The requirement of which principle is of particular importance in an assurance ... the intended user? a. Integrity b. Confidentiality c. Professional competence d. Objectivity

Last Answer : Objectivity

Description : Which factor determines when your IT system will be available for knowledge worker to access? a) Availability b) Accessibility c) Reliabilityd) None of the above

Last Answer : a) Availability

Description : Which one is a communication channel threat? a) Sniffer programs b) Cyber vandalism c) Integrity threats d) All of the above

Last Answer : d) All of the above

Description : What is not a role of encryption? a)It is used to protect data from unauthorized access during transmission. b)It is used to ensure user authentication c)It is used to ensure data integrity d)It is used to ensure data corruption does not happens

Last Answer : d)It is used to ensure data corruption does not happens

Description : The type of threats on the security of a computer system or network are …………………….. i) Interruption ii)Interception iii) Modification iv) Creation v)Fabrication a) i, ii, iii and iv only b) ii, iii, iv and v only c) i, ii, iii and v only d) All i, ii, iii, iv and v

Last Answer : c) i, ii, iii and v only

Description : What is Food security means: (a) availability of food (b) accessibility of food (c) affordability of food (d) all the above

Last Answer : (d) all the above

Description : A combination of software and information designed to provide security and information for payment is called - a. digital wallet b. pop up ad c shopping cart d. encryption

Last Answer : d. encryption

Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. Pop up ad c. Shopping cart d. Encryption

Last Answer : a. digital wallet

Description : Food Authenticity means a) The food should match the description. b) The food should taste good c) It should be cheap. d) None of the mentioned

Last Answer :  The food should match the description

Description : Food authenticity means e)The food should match the description c) The food should taste good f)It should be cheap d) None of the above

Last Answer : The food should match the description

Description : Write down the major issues of security and integrity of information. -Technology

Last Answer : There are three major issues as follows:1. Confidentiality2. Integrity3. Availability

Description : The term is used to represent_“information is accurate and complete” (a) Security (b) Integrity (c) Completeness (d) Counterfeiting -Technology

Last Answer : (b) Integrity means information is accurate and complete.

Description : Unauthorized communication of information means and include:- a) To which he is not authorized to have access. b) Which he is not authorized to keep in his personal custody c) Both A & B d) None of these

Last Answer : c) Both A & B

Description : THE INFORMATION IS BROADCASTED BY ELECTRONIC MEANS IN THE a) Media b) Electronic Media c) Mass media d) None of these

Last Answer : b) Electronic Media

Description : ......................is the term which simply means the reporting of information that helps people cope with their daily lives and it is the bread and butter of magazines. a) Service Journalism b) Yellow Journalism c) Sports Journalism d) Chequebook Journalism

Last Answer : a) Service Journalism

Description : An accepted means of issuing information to the press is called as: a) Vox Pop b) Interview c) Press Conference d) None of these

Last Answer : c) Press Conference

Description : Intruders is a most common security threat which referred as? a)Account Access b)Data Access c)Hacker or Cracker d)Computer Access

Last Answer : c)Hacker or Cracker

Description : ________ means that the participant's identity, although known to the researcher, is not revealed to anyone outside of the researcher and his or her staff. a. Anonymity b. Confidentiality

Last Answer : b. Confidentiality

Description : One aspect that has to be dealt with by the integrity subsystem is to ensure that only valid values can be assigned to each data items. This is referred to as A) Data Security B) Domain access C) Data Control

Last Answer : C) Data Control

Description : The security furnished by an official will be liable to forfeiture by a) Director General b) Head of the circle c) Any officer authorized by DG Post d) Both the A & C

Last Answer : d) Both the A & C

Description : ..............................is known as the art of arranging various visual elements to form newspaper page. a) Printing b) Editing c) Proof Reading d) Layout

Last Answer : d) Layout

Description : The reading of the script to check the errors is called: a) Composing b) Proof-reading c) Editing d) None of these

Last Answer : b) Proof-reading

Description : The reading of the script to check the errors is called: A. Composing B. Proof-reading C. Editing D. None of these

Last Answer : B. Proof-reading

Description : The reading of the script to check the errors is called: A. Composing B. Editing C. Proof-reading D. None of these

Last Answer : C. Proof-reading

Description : The term used to describe a terrorist attack on a computer information system is- a. Cyber Attack b. Cyber Terrorism c. Time Bomb d. None of the these

Last Answer : b. Cyber Terrorism

Description : The term used to describe a terrorist attack on a computer information system is a. Cyber Attack b. Cyber Terrorism c. Time Bomb d. None of the these

Last Answer : b. Cyber Terrorism

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryption b. Decryption c. firewall d. all the above

Last Answer : d. all the above

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryptionb. Decryption c. firewall d. all the above

Last Answer : d. all the above

Description : The main thrust of ‘Copenhegen Summit’ was: a) Food Security b) Air Pollution c) Rehabilitation d) Climate Change

Last Answer : d) Climate Change

Description : The right to life, liberty and security of person under the ICCPR is contained in a. Article 1 b. Article 2 c. Article 3 d. Article 4

Last Answer : c. On 20 th November 1989

Description : What is the myth of protection? [A] It characterizes men as protective and women as protected [B] It is used to justify and shape material security policies [C] It has been challenged by changing gender role in contemporary warfare [D] All of the above

Last Answer : [D] All of the above

Description : n processes, access control implements a a)Security Policy b)Access Policy c)Control Policy d)Check Policy

Last Answer : a)Security Policy

Description : Use of Full Body Scanner at Airport is an issue between a. Security and Copyright b. Copyright and Privacy c. Security and Privacy d. None of the above

Last Answer : c. Security and Privacy

Description : How the medical assistant can ensure confidentiality of patient information during a visit to health care facility?

Last Answer : What is the answer ?