2.Vulnerabilities and risks are evaluated based on their threats against which of the following?
A.One or more of the CIA Triad principles
B.Data usefulness
C.Due care
D.Extent of liability
3.Which of the following is a principle of the CIA Triad that means authorized subjects are granted timely and uninterrupted access to objects?
A.Identification
B.Availability
C.Encryption
D.Layering
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here