Data integrity gets compromised when _____ and _____ are taken control off.
(a) Access control, file deletion
(b) Network, file permission
(c) Access control, file permission
(d) Network, system
I have been asked this question in an online quiz.
This is a very interesting question from Elements of Security in portion Cyber Security of Cyber Security
Select the correct answer from above options
Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,