Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What is the CIA triangle?



What is the CIA triangle?..

Answer / chaitanya

Confidentiality, Integrity, Availability. As close to a ‘code’ for Information Security as it is possible to get, it is the boiled down essence of InfoSec. Confidentiality- keeping data secure. Integrity- keeping data intact. Availability- keeping data accessible.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More Computer Security Interview Questions

 How would you compromise an “Office Workstation” at a hotel?

1 Answers  


 What is the difference between an HIDS and a NIDS?

1 Answers  


What is residual risk?

1 Answers  


 Why is deleted data not truly gone when you delete it?

1 Answers  


What is a table in computer?

0 Answers  


What are accessories in computer?

0 Answers  


What’s the difference between Symmetric and Asymmetric encryption?

1 Answers  


What are the three ways to authenticate a person?

1 Answers  


 What are salted hashes?

1 Answers  


 What is the Chain of Custody?

1 Answers  


 What is your opinion on hacktivist groups such as Anonymous?

1 Answers  


You find out that there is an active problem on your network. You can fix it, but it is out of your jurisdiction. What do you do?

1 Answers  


Categories
  • Computer Security Interview Questions Computer Security (58)
  • Mobile Security Interview Questions Mobile Security (9)
  • Hacking Interview Questions Hacking (33)
  • Security AllOther Interview Questions Security AllOther (4)