The first phase of hacking an IT system is compromise of which foundation of security?

The first phase of hacking an IT system is compromise of which foundation of security?

Q. The first phase of hacking an IT system is compromise of which foundation of security?

A.            Availability

B.            Confidentiality

C.            Integrity

D.            None of the Above

Answer: Confidentiality

Scroll to Top