275 views
0 votes
0 votes
Match the following

a.  Secrecy.                     1. Limit the resource usage.

b Integrity               2. Unauthorized modification

c availbility.            3. Unauthorized  disclosure

1 Answer

0 votes
0 votes
a-3  

b-2

c-1

correct me if i am wrong

Related questions

1 votes
1 votes
1 answer
1
0 votes
0 votes
1 answer
2
Suman Acharya asked Sep 14, 2017
621 views
In a mandatory access control, information from top secret object will not flow to secret and vice versaTrueFalse
0 votes
0 votes
1 answer
3
Suman Acharya asked Sep 14, 2017
639 views
ASLR randomizesa. The size of all arrays, thereby by making it difficult to perform buffer overflowsb. All instructions in the programc. Positions of the stack, heap and...
0 votes
0 votes
1 answer
4
Suman Acharya asked Sep 14, 2017
493 views
The number of gadgets present in the implementation depends on the number of C3 instruction in the machine codeTrueFalse