COMPILER DESIGN

ADVANCED TOPICS IN COMPILER DESIGN

CODE GENERATION FOR OBJECT ORIENTED LANGUAGES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which pillar of cybersecurity is this a violation of? A private investigator uses a copy of a coworker’s fingerprint to gain access to a computer with a biometric fingerprint sensor.
A
Authentication
B
Availability
C
Confidentiality
D
Integrity
Explanation: 
There is 1 question to complete.