Lecture 2 Ehical Hacking Framework
Lecture 2 Ehical Hacking Framework
Answer: C. Availability
• Which of the following measures is primarily used to maintain
confidentiality?
• A. Redundant systems
B. Encryption
C. Checksums
D. Load balancing
• Answer: B. Encryption
• What is a common method to ensure the integrity of a file?
• A. Using a VPN
B. Employing firewalls
C. Implementing hash functions
D. Setting up multi-factor authentication