Controlling access to information systems and associated networks is necessary for the preservation of their:

A.
Authenticity, confidentiality and availability
B.
Confidentiality, integrity, and availability.
C.
Integrity and availability.
D.
Authenticity, confidentiality, integrity and availability.
Explanation:
Information security is made up of the following main attributes:
Availability – Prevention of loss of, or loss of access to, data and resources
Integrity – Prevention of unauthorized modification of data and resources
Confidentiality – Prevention of unauthorized disclosure of data and resources
Incorrect Answers:
A: Authenticity is an attribute that stems from the three main attributes.
C: Information security is made up of three main attributes, which includes confidentiality.
D: Authenticity is an attribute that stems from the three main attributes.Harris, Shon, All In One CISSP Exam Guide, 6th Edition, McGraw-Hill, 2013, pp. 298, 299