JAMB - Computer Studies (2022 - No. 68)
Destruction of files for malicious reasons such as access by fraudulent people is classified as being
modified
accessed
destroyed
unauthorized access
Explanation
Access to an information system or network that violates the owner or operator's stated security policy is considered unauthorized access.
Comments (0)
