Physical protection involves ____.
A. intangible things
B. concrete things
C. information assets
D. both intangible and concrete things
Answer: B
You might also like to view...
Which of the following is used to access the Internet when WiFi is not available?
a. mobile hotspot b. 4G LTE Internet access c. 3G Internet access d. all of the above
List the four characteristics a hash algorithm should have if it is to be considered secure.
What will be an ideal response?
What kind of program is Adobe Illustrator and what are some of its uses?
What will be an ideal response?
What happens when you deselect the Allow changes by more than one user at the same time option on the Editing tab of the Share Workbook dialog box
A. The workbook returns to unshared status. B. The workbook is nested. C. The workbook is password-protected D. The workbook is saved as a shared workbook.