Que: Data integrity gets compromised when _____ and _____ are taken control off.

a. Access control, file deletion
b. Network, file permission
c. Access control, file permission
d. Network, system
Answer: Access control, file permission

Leave a Comment