1.

What is breach of availability?

A. This type of violation involves unauthorized reading of data
B. This violation involves unauthorized modification of data
C. This violation involves unauthorized destruction of data
D. This violation involves unauthorized use of resources
Answer» D. This violation involves unauthorized use of resources


Discussion

No Comment Found