282 views
0 votes
0 votes
Match the following

a.  Secrecy.                     1. Limit the resource usage.

b Integrity               2. Unauthorized modification

c availbility.            3. Unauthorized  disclosure

1 Answer

0 votes
0 votes
a-3  

b-2

c-1

correct me if i am wrong

Related questions

1 votes
1 votes
1 answer
1
0 votes
0 votes
1 answer
2
Suman Acharya asked Sep 14, 2017
606 views
In a mandatory access control, information from top secret object will not flow to secret and vice versaTrueFalse
0 votes
0 votes
1 answer
3
Suman Acharya asked Sep 14, 2017
620 views
ASLR randomizesa. The size of all arrays, thereby by making it difficult to perform buffer overflowsb. All instructions in the programc. Positions of the stack, heap and...
0 votes
0 votes
1 answer
4
Suman Acharya asked Sep 14, 2017
491 views
The number of gadgets present in the implementation depends on the number of C3 instruction in the machine codeTrueFalse