The first step in a successful attack against availability or-06216
The first step in a successful attack against availability or confidentiality of information may be the violation of __________.
This multiple choice question (MCQ) is related to the book/course vu cs507 Information Systems. It can also be found in vu cs507 Final Term - Quiz No.8.
The first step in a successful attack against availability or confidentiality of information may be the violation of __________.
Completeness constraints
Consistency
Integrity
Reliability