{"id":92624,"date":"2025-06-01T11:29:21","date_gmt":"2025-06-01T11:29:21","guid":{"rendered":"https:\/\/exam.pscnotes.com\/mcq\/?p=92624"},"modified":"2025-06-01T11:29:21","modified_gmt":"2025-06-01T11:29:21","slug":"in-computer-security-which-one-of-the-following-means-that-the-inform","status":"publish","type":"post","link":"https:\/\/exam.pscnotes.com\/mcq\/in-computer-security-which-one-of-the-following-means-that-the-inform\/","title":{"rendered":"In computer security, which one of the following means that the inform"},"content":{"rendered":"<p>In computer security, which one of the following means that the information in a computer system can only be accessed by authenticated parties ?<\/p>\n<p>[amp_mcq option1=&#8221;Confidentiality&#8221; option2=&#8221;Integrity&#8221; option3=&#8221;Availability&#8221; option4=&#8221;Reliability&#8221; correct=&#8221;option1&#8243;]<\/p>\n<div class=\"psc-box-pyq-exam-year-detail\">\n<div class=\"pyq-exam\">\n<div class=\"psc-heading\">This question was previously asked in<\/div>\n<div class=\"psc-title line-ellipsis\">UPSC CISF-AC-EXE &#8211; 2018<\/div>\n<\/div>\n<div class=\"pyq-exam-psc-buttons\"><a href=\"\/pyq\/pyq-upsc-cisf-ac-exe-2018.pdf\" target=\"_blank\" class=\"psc-pdf-button\" rel=\"noopener\">Download PDF<\/a><a href=\"\/pyq-upsc-cisf-ac-exe-2018\" target=\"_blank\" class=\"psc-attempt-button\" rel=\"noopener\">Attempt Online<\/a><\/div>\n<\/div>\n<section id=\"pyq-correct-answer\">\nThe correct answer is (A) Confidentiality. Confidentiality in computer security ensures that information is accessible only to those individuals or systems that have been authorized to access it. This is typically achieved through authentication and authorization mechanisms.<br \/>\n<\/section>\n<section id=\"pyq-key-points\">\n&#8211; Confidentiality is one of the core principles of the CIA triad (Confidentiality, Integrity, Availability), which are fundamental goals of computer security.<br \/>\n&#8211; Authentication verifies the identity of a user or system, while authorization determines what authenticated users are allowed to do.<br \/>\n&#8211; Measures like encryption, access controls, and strong authentication are used to maintain confidentiality.<br \/>\n<\/section>\n<section id=\"pyq-additional-information\">\n&#8211; (B) Integrity ensures that data is accurate, complete, and has not been tampered with or modified in an unauthorized way.<br \/>\n&#8211; (C) Availability ensures that systems, services, and data are accessible to authorized users when needed.<br \/>\n&#8211; (D) Reliability refers to the ability of a system to perform its intended function correctly and consistently over time. While related to availability and integrity, it is not the primary term for restricting access to authenticated parties.<br \/>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>In computer security, which one of the following means that the information in a computer system can only be accessed by authenticated parties ? [amp_mcq option1=&#8221;Confidentiality&#8221; option2=&#8221;Integrity&#8221; option3=&#8221;Availability&#8221; option4=&#8221;Reliability&#8221; correct=&#8221;option1&#8243;] This question was previously asked in UPSC CISF-AC-EXE &#8211; 2018 Download PDFAttempt Online The correct answer is (A) Confidentiality. Confidentiality in computer security ensures that &#8230; <\/p>\n<p class=\"read-more-container\"><a title=\"In computer security, which one of the following means that the inform\" class=\"read-more button\" href=\"https:\/\/exam.pscnotes.com\/mcq\/in-computer-security-which-one-of-the-following-means-that-the-inform\/#more-92624\">Detailed Solution<span class=\"screen-reader-text\">In computer security, which one of the following means that the inform<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1089],"tags":[1114,1113],"class_list":["post-92624","post","type-post","status-publish","format-standard","hentry","category-upsc-cisf-ac-exe","tag-1114","tag-information-and-communication-technology","no-featured-image-padding"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v23.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>In computer security, which one of the following means that the inform<\/title>\n<meta name=\"description\" content=\"The correct answer is (A) Confidentiality. Confidentiality in computer security ensures that information is accessible only to those individuals or systems that have been authorized to access it. This is typically achieved through authentication and authorization mechanisms. - Confidentiality is one of the core principles of the CIA triad (Confidentiality, Integrity, Availability), which are fundamental goals of computer security. - Authentication verifies the identity of a user or system, while authorization determines what authenticated users are allowed to do. - Measures like encryption, access controls, and strong authentication are used to maintain confidentiality.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/exam.pscnotes.com\/mcq\/in-computer-security-which-one-of-the-following-means-that-the-inform\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"In computer security, which one of the following means that the inform\" \/>\n<meta property=\"og:description\" content=\"The correct answer is (A) Confidentiality. Confidentiality in computer security ensures that information is accessible only to those individuals or systems that have been authorized to access it. This is typically achieved through authentication and authorization mechanisms. - Confidentiality is one of the core principles of the CIA triad (Confidentiality, Integrity, Availability), which are fundamental goals of computer security. - Authentication verifies the identity of a user or system, while authorization determines what authenticated users are allowed to do. - Measures like encryption, access controls, and strong authentication are used to maintain confidentiality.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/exam.pscnotes.com\/mcq\/in-computer-security-which-one-of-the-following-means-that-the-inform\/\" \/>\n<meta property=\"og:site_name\" content=\"MCQ and Quiz for Exams\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-01T11:29:21+00:00\" \/>\n<meta name=\"author\" content=\"rawan239\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"rawan239\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"In computer security, which one of the following means that the inform","description":"The correct answer is (A) Confidentiality. Confidentiality in computer security ensures that information is accessible only to those individuals or systems that have been authorized to access it. This is typically achieved through authentication and authorization mechanisms. - Confidentiality is one of the core principles of the CIA triad (Confidentiality, Integrity, Availability), which are fundamental goals of computer security. - Authentication verifies the identity of a user or system, while authorization determines what authenticated users are allowed to do. - Measures like encryption, access controls, and strong authentication are used to maintain confidentiality.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/exam.pscnotes.com\/mcq\/in-computer-security-which-one-of-the-following-means-that-the-inform\/","og_locale":"en_US","og_type":"article","og_title":"In computer security, which one of the following means that the inform","og_description":"The correct answer is (A) Confidentiality. Confidentiality in computer security ensures that information is accessible only to those individuals or systems that have been authorized to access it. This is typically achieved through authentication and authorization mechanisms. - Confidentiality is one of the core principles of the CIA triad (Confidentiality, Integrity, Availability), which are fundamental goals of computer security. - Authentication verifies the identity of a user or system, while authorization determines what authenticated users are allowed to do. - Measures like encryption, access controls, and strong authentication are used to maintain confidentiality.","og_url":"https:\/\/exam.pscnotes.com\/mcq\/in-computer-security-which-one-of-the-following-means-that-the-inform\/","og_site_name":"MCQ and Quiz for Exams","article_published_time":"2025-06-01T11:29:21+00:00","author":"rawan239","twitter_card":"summary_large_image","twitter_misc":{"Written by":"rawan239","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/exam.pscnotes.com\/mcq\/in-computer-security-which-one-of-the-following-means-that-the-inform\/","url":"https:\/\/exam.pscnotes.com\/mcq\/in-computer-security-which-one-of-the-following-means-that-the-inform\/","name":"In computer security, which one of the following means that the inform","isPartOf":{"@id":"https:\/\/exam.pscnotes.com\/mcq\/#website"},"datePublished":"2025-06-01T11:29:21+00:00","dateModified":"2025-06-01T11:29:21+00:00","author":{"@id":"https:\/\/exam.pscnotes.com\/mcq\/#\/schema\/person\/5807dafeb27d2ec82344d6cbd6c3d209"},"description":"The correct answer is (A) Confidentiality. Confidentiality in computer security ensures that information is accessible only to those individuals or systems that have been authorized to access it. This is typically achieved through authentication and authorization mechanisms. - Confidentiality is one of the core principles of the CIA triad (Confidentiality, Integrity, Availability), which are fundamental goals of computer security. - Authentication verifies the identity of a user or system, while authorization determines what authenticated users are allowed to do. - Measures like encryption, access controls, and strong authentication are used to maintain confidentiality.","breadcrumb":{"@id":"https:\/\/exam.pscnotes.com\/mcq\/in-computer-security-which-one-of-the-following-means-that-the-inform\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/exam.pscnotes.com\/mcq\/in-computer-security-which-one-of-the-following-means-that-the-inform\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/exam.pscnotes.com\/mcq\/in-computer-security-which-one-of-the-following-means-that-the-inform\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/exam.pscnotes.com\/mcq\/"},{"@type":"ListItem","position":2,"name":"UPSC CISF-AC-EXE","item":"https:\/\/exam.pscnotes.com\/mcq\/category\/upsc-cisf-ac-exe\/"},{"@type":"ListItem","position":3,"name":"In computer security, which one of the following means that the inform"}]},{"@type":"WebSite","@id":"https:\/\/exam.pscnotes.com\/mcq\/#website","url":"https:\/\/exam.pscnotes.com\/mcq\/","name":"MCQ and Quiz for Exams","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/exam.pscnotes.com\/mcq\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/exam.pscnotes.com\/mcq\/#\/schema\/person\/5807dafeb27d2ec82344d6cbd6c3d209","name":"rawan239","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/exam.pscnotes.com\/mcq\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/761a7274f9cce048fa5b921221e7934820d74514df93ef195a9d22af0c1c9001?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/761a7274f9cce048fa5b921221e7934820d74514df93ef195a9d22af0c1c9001?s=96&d=mm&r=g","caption":"rawan239"},"sameAs":["https:\/\/exam.pscnotes.com"],"url":"https:\/\/exam.pscnotes.com\/mcq\/author\/rawan239\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/posts\/92624","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/comments?post=92624"}],"version-history":[{"count":0,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/posts\/92624\/revisions"}],"wp:attachment":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/media?parent=92624"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/categories?post=92624"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/tags?post=92624"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}