Answer Posted / arul.nandhakumar
Confidentiality
Integrity
Availability
Authenticating
Authorization
| Is This Answer Correct ? | 4 Yes | 0 No |
Post New Answer View All Answers
What do you do when you get blue screen in a computer? How do you troubleshoot it?
Explain difference between broadcast domain and collision domain?
What is an arp and how does it work?
What is difference between discretionary access control and mandatory access control?
What does cia stand for in security management?
What are Digrams and Trigrams
What is the difference between cybersecurity and information security?
If you need to encrypt and compress data for transmission, how would you achieve it?
What are the different types of vpns?
What is the role of single sign on in authentication technologies?
What are the possible ways of data exchange
What are all the technical steps involved when the data transmission from server via router?
What are the different types of network security?
What is threat-focused ngfw?
Define the meaning of an Authentication.