ISC Exam Questions

which of the following security properties?

Most computer attacks result in violation of which of the following security properties?

A.
Availability

B.
Confidentiality

C.
Integrity and control

D.
All of the choices.

Explanation:
Most computer attacks only corrupt a system’s security in very specific ways. For
example, certain attacks may enable a hacker to read specific files but don’t allow
alteration of any system components. Another attack may allow a hacker to shut down
certain system components but doesn’t allow access to any files. Despite the varied
capabilities of computer attacks, they usually result in violation of only four
different security properties: availability, confidentiality, integrity, and control.