Frank discovers a keylogger hidden on the laptop of his company’s chief executive officer. What information security principle is the keylogger most likely designed to disrupt?
Answer:
Recovery is the correct answer to the given question.
Explanation:
Recovery is used when the data is lost from the database in any issue Database Recovery is giving the data to returning in its consistent state of the database.
When George sees that the PL Technologies is suffered from considerable data loss due to it is infected by a virus then George retrieving the information and the data by using the recovery process
Computer - Input Devices
Keyboard.
Mouse.
Joy Stick.
Light pen.
Track Ball.
Scanner.
Graphic Tablet.
Microphone.
Computer - Output Devices
Monitor.
Printer.
Headphones.
Computer Speakers.
Projector.
GPS.
Sound Card.
Video Card.