Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What are the 5 aspects of IT-Security?

Answers were Sorted based on User's Feedback



What are the 5 aspects of IT-Security?..

Answer / arul.nandhakumar

Confidentiality
Integrity
Availability
Authenticating
Authorization

Is This Answer Correct ?    4 Yes 0 No

What are the 5 aspects of IT-Security?..

Answer / vani

is confidentiality
integrity

authenticity

authorisation

nonrepudiation

Is This Answer Correct ?    3 Yes 1 No

What are the 5 aspects of IT-Security?..

Answer / sheetal suthar

confidiantiality
authenticity
intigrity
availibility

Is This Answer Correct ?    1 Yes 1 No

What are the 5 aspects of IT-Security?..

Answer / karthiga ashokkumar

Confidentiality
Integrity
Availability
Authenticity
Authorization

Is This Answer Correct ?    0 Yes 0 No

What are the 5 aspects of IT-Security?..

Answer / pinaki dey

desktop security, server security,network security,
communication security,hard copy(policy) security.

Is This Answer Correct ?    1 Yes 2 No

What are the 5 aspects of IT-Security?..

Answer / allu subash mohan ganesh

3.1 Military security
3.2 Political security
3.3 Economic security
3.4 Environmental security
3.5 Security of energy and natural resources

Is This Answer Correct ?    0 Yes 3 No

Post New Answer

More Networking Security Interview Questions

What is difference between baseband and broadband transmission

0 Answers   Elgi Equipments,


What does cia stand for in security management?

0 Answers  


What is remote access vpn?

0 Answers  


Why do we use virtual private network?

0 Answers  


What is the sense of a fingerprint?

0 Answers  


What is a Password?

0 Answers  


What is the difference between cybersecurity and information security?

0 Answers  


explain how do we do authentication with message digest(md5)? (Usually md is used for finding tampering of data)

0 Answers  


Explain how does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?

0 Answers  


How does the HTTP handle state?

0 Answers  


SAP GRC / Security & Authorizations TRAINING / Virsa and CC tools(GRC 5.3)

4 Answers   SAP Labs,


Diff bet ripv1 & ripv2?

0 Answers  


Categories
  • Networking Protocols Interview Questions Networking Protocols (671)
  • Networking Administration Interview Questions Networking Administration (1008)
  • Networking Security Interview Questions Networking Security (196)
  • Networking General Interview Questions Networking General (266)
  • Networking AllOther Interview Questions Networking AllOther (430)