Q. The first phase of hacking an IT system is compromise of which foundation of security?
A. Availability
B. Confidentiality
C. Integrity
D. None of the Above
Answer: Confidentiality
A. Availability
B. Confidentiality
C. Integrity
D. None of the Above
Answer: Confidentiality