Data integrity gets compromised when _____ and _____ are taken control off.
(a) Access control, file deletion
(b) Network, file permission
(c) Access control, file permission
(d) Network, system
I have been asked this question in an online quiz.
This is a very interesting question from Elements of Security in portion Cyber Security of Cyber Security