1.

Data integrity gets compromised when _____ and_____ are taken control off.(a) Access control, file deletion(b) Network, file permission(c) Access control, file permission(d) Network, systemI have been asked this question in an online quiz.This is a very interesting question from Elements of Security in portion Cyber Security of Cyber Security

Answer»

The CORRECT choice is (c) Access control, file permission

Easiest explanation: The two KEY ingredients that NEED to be kept SAFE are: access control & file permission in ORDER to preserve data integrity.



Discussion

No Comment Found

Related InterviewSolutions