Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

One component of the DAD Triad, _ _ _ _ _ _ _ _ _ _ refers to the unauthorized transfer of information to individuals

One component of the DAD Triad, __________ refers to the unauthorized transfer of information to individuals without the appropriate security clearance and/or need-to-know.
a) destruction
b) alteration
c) disclosure
d) denial
One component of the ClA Triad, _______ specifies that all data on the secured system or network must be protected against unauthorized modification.
a) confidentiality
b) integrity
c) authority
d) availability
A(n)__________ is a program that intercepts network packets as they pass by.
a) honeypot
b) packet sniffer
c) snort
d) threshold
A __________ error reports normal activity as being suspicious.
a) subversion
b) false negative
c) false positive
d) false report

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Big Data With Hadoop MapReduce A Classroom Approach

Authors: Rathinaraja Jeyaraj ,Ganeshkumar Pugalendhi ,Anand Paul

1st Edition

1774634848, 978-1774634844

More Books

Students also viewed these Databases questions