Exam4Training

Which component of the IT Security Model is attacked with modification?

Which component of the IT Security Model is attacked with modification?
A . Authentication
B . Availability
C . Integrity
D . Confidentiality

Answer: C

Explanation:

Modification attacks directly impact the integrity of data within the IT Security Model. Integrity ensures that information is accurate and unchanged from its original form unless altered by authorized means. An attack that involves modification manipulates data in unauthorized ways, thereby compromising its accuracy and reliability.

Reference: Shon Harris, "CISSP Certification: All-in-One Exam Guide".

Latest ICS-SCADA Dumps Valid Version with 75 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Exit mobile version