Which of the following can compromise data integrity? (Choose two)
A . Unauthorized modifications
B . Man-in-the-middle attacks
C . User authentication failures
D . Distributed denial-of-service attacks
Answer: A, B
Explanation:
Unauthorized modifications and interception during transmission (e.g., man-in-the-middle attacks) jeopardize data integrity.
Latest 112-12 Dumps Valid Version with 100 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund