InterviewSolution
Saved Bookmarks
| 1. |
This helps in identifying the origin of information and authentic user. This referred to here as __________(a) Confidentiality(b) Integrity(c) Authenticity(d) AvailabilityI have been asked this question in a job interview.The origin of the question is Elements of Security in chapter Cyber Security of Cyber Security |
|
Answer» Right choice is (c) Authenticity |
|