Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What are the 5 aspects of IT-Security?

Answers were Sorted based on User's Feedback



What are the 5 aspects of IT-Security?..

Answer / arul.nandhakumar

Confidentiality
Integrity
Availability
Authenticating
Authorization

Is This Answer Correct ?    4 Yes 0 No

What are the 5 aspects of IT-Security?..

Answer / vani

is confidentiality
integrity

authenticity

authorisation

nonrepudiation

Is This Answer Correct ?    3 Yes 1 No

What are the 5 aspects of IT-Security?..

Answer / sheetal suthar

confidiantiality
authenticity
intigrity
availibility

Is This Answer Correct ?    1 Yes 1 No

What are the 5 aspects of IT-Security?..

Answer / karthiga ashokkumar

Confidentiality
Integrity
Availability
Authenticity
Authorization

Is This Answer Correct ?    0 Yes 0 No

What are the 5 aspects of IT-Security?..

Answer / pinaki dey

desktop security, server security,network security,
communication security,hard copy(policy) security.

Is This Answer Correct ?    1 Yes 2 No

What are the 5 aspects of IT-Security?..

Answer / allu subash mohan ganesh

3.1 Military security
3.2 Political security
3.3 Economic security
3.4 Environmental security
3.5 Security of energy and natural resources

Is This Answer Correct ?    0 Yes 3 No

Post New Answer

More Networking Security Interview Questions

Which are the different factors that affect the security of a network?

0 Answers  


Explain for a small lan which class of addressing is used?

0 Answers  


Is folder redirection functionality supported in Windows server 2008???

1 Answers   Wipro,


In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?

0 Answers  


What is site-to-site vpn?

0 Answers  


Describe a TCP connection sequence

0 Answers   HCL,


How does arp works?

0 Answers  


What is broadband?What is bandwidth?What is frequency?

5 Answers   Excel, Wipro,


What is the difference between a virus and malware?

0 Answers  


What is malware?

0 Answers  


What is Imaging/ghosting?

0 Answers  


How does phishing work?

0 Answers  


Categories
  • Networking Protocols Interview Questions Networking Protocols (671)
  • Networking Administration Interview Questions Networking Administration (1008)
  • Networking Security Interview Questions Networking Security (196)
  • Networking General Interview Questions Networking General (266)
  • Networking AllOther Interview Questions Networking AllOther (430)