a. Physical theft of data & hardware |
b. Physical damage or destruction of data & hardware |
c. Unauthorized network access |
d. Keystroke & Other Input Logging |
Answer: Unauthorized network access |
a. Physical theft of data & hardware |
b. Physical damage or destruction of data & hardware |
c. Unauthorized network access |
d. Keystroke & Other Input Logging |
Answer: Unauthorized network access |