Q. In an any organization, company or firm the policies of information security come under__________
A. CIA Triad
B. Confidentiality
C. Authenticity
D. None of the above
Answer: CIA Triad
A. CIA Triad
B. Confidentiality
C. Authenticity
D. None of the above
Answer: CIA Triad