JAMB - Computer Studies (2022 - No. 68)

Destruction of files for malicious reasons such as access by fraudulent people is classified as being
modified
accessed
destroyed
unauthorized access

Explanation

Access to an information system or network that violates the owner or operator's stated security policy is considered unauthorized access.

Comments (0)

Advertisement