Availability can be protected through the use of:

Availability can be protected through the use of:
A . user awareness training and related end-user training.
B . access controls. We permissions, and encryption.
C . logging, digital signatures, and write protection.
D . redundancy, backups, and business continuity management

Answer: D

Explanation:

Availability can be protected through the use of redundancy, backups, and business continuity management. This is because these measures help to ensure that systems, data, and services are accessible and functional at all times, even in the event of a disruption or disaster. The other options are not directly related to protecting availability, but rather focus on enhancing confidentiality (A), integrity C, or awareness (D).

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments