Question: QUESTION 44 Match the engineering mitigation options with the items below. QUESTION 45 Match the best description to each cybersecurity term [- /] Access to

QUESTION 44

  1. Match the engineering mitigation options with the items below.

QUESTION 45

  1. Match the best description to each cybersecurity term

[- \/]

Access to cyber system only for those with authority

[- \/]

Manipulation of cyber resources can be performed only by those with authority

[- \/]

Assurance of access and functionality in a timely manner and certain level of performance

[- \/]

User or program is only given the minimum privileges required to carry out its duty

A.

Confidentiality

B.

Integrity

C.

Availability

D.

Principle of Least Privilege

A.

loss prevention

B.

loss reduction

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!