ADVANCED TOPICS IN COMPILER DESIGN
CODE GENERATION FOR OBJECT ORIENTED LANGUAGES
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
Which pillar of cybersecurity is this a violation of? A private investigator uses a copy of a coworker’s fingerprint to gain access to a computer with a biometric fingerprint sensor.
|
Authentication
|
|
Availability
|
|
Confidentiality
|
|
Integrity
|
Explanation:
There is 1 question to complete.