Saved Bookmarks
| 1. |
What is breach of availability?(a) This type of violation involves unauthorized reading of data(b) This violation involves unauthorized modification of data(c) This violation involves unauthorized destruction of data(d) This violation involves unauthorized use of resources |
|
Answer» The correct choice is (c) This violation involves unauthorized destruction of data The best explanation: None. |
|