Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Which of the following refers to the violation of the principle if a computer is no more accessible?
Home
Cyber Security
Which of the following refers to the violation of the principle if a computer is no more accessible?
0
votes
asked
Feb 8, 2022
in
Cyber Security
by
Robindeniel
Which of the following refers to the violation of the principle if a computer is no more accessible?
Select the correct answer from below option
a) Access control
b) Confidentiality
c) Availability
d) All of the above
computer-principle
cyber-security
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Feb 8, 2022
by
Robindeniel
c) Availability refers to the violation of the principle if a computer is no more accessible
Related questions
0
votes
Q: Which one of the following refers to the technique used for verifying the integrity of the message?
asked
Feb 8, 2022
in
Cyber Security
by
Robindeniel
software-integration
cyber-security
0
votes
Q: Which of the following refers to exploring the appropriate, ethical behaviors related to the online environment and digital media platform?
asked
Feb 8, 2022
in
Cyber Security
by
Robindeniel
cyber-security
ethical-behaviors
0
votes
Q: Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information?
asked
Feb 8, 2022
in
Cyber Security
by
Robindeniel
steal
spy
cyber-security
0
votes
Q: The web application like banking websites should ask its users to log-in again after some specific period of time, let say 30 min. It can be considered as an example of which cybersecurity principle?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
cyber-security
+1
vote
Q: Which one of the following principles states that sometimes it is become more desirable to rescored the details of intrusion that to adopt more efficient measure to avoid it?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
cyber-security
+1
vote
Q: Which is more secure SSL or HTTPS?
asked
Jan 19, 2023
in
Cyber Security
by
Robindeniel
ssl
http
cyber-security
0
votes
Q: Which of the following is a type of cyber security?
asked
Feb 8, 2022
in
Cyber Security
by
Robindeniel
cyber-security
0
votes
Q: Which of the following can also consider as the instances of Open Design?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
cyber-security
0
votes
Q: Which of the following act violates cyber security?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
cyber-security
0
votes
Q: Which of the following is not an advantage of cyber security?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
cyber-security
...