Answer:
Check the explanation
Step-by-step explanation:
The two examples for each type of violation:
A) Power failure and Act of sabotage
B) Accidental deletion of file and Permission failure
C) Tampering of data, Denial of service attack
D) Failures of HDD (hard disk) and finding program bugs.
Note:
There is a difference in trusted behavior for pc's and servers are relevant because pea-to-peer system must be designed to cope with the looser interpretation of trust for pi s