Operating System Security Program System Threats
Q What is breach of availability?
  • A A. This type of violation involves unauthorized reading of data
  • B B. This violation involves unauthorized modification of data
  • C C. This violation involves unauthorized destruction of data
  • D D. This violation involves unauthorized use of resources
Leave a Comment