Availability can be protected through the use of:
A . user awareness training and related end-user training.
B . access controls. We permissions, and encryption.
C . logging, digital signatures, and write protection.
D . redundancy, backups, and business continuity management
Answer: D
Explanation:
Availability can be protected through the use of redundancy, backups, and business continuity management. This is because these measures help to ensure that systems, data, and services are accessible and functional at all times, even in the event of a disruption or disaster. The other options are not directly related to protecting availability, but rather focus on enhancing confidentiality (A), integrity C, or awareness (D).
Latest Cybersecurity Audit Certificate Dumps Valid Version with 75 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund