________ security protects computer-based data from software-based and communication-based threats.

A. Infrastructure B. Premises
C. Physical D. Logical


D. Logical

Computer Science & Information Technology

You might also like to view...

To concatenate values in an expression, an asterisk should be entered between the values to be concatenated

Indicate whether the statement is true or false

Computer Science & Information Technology

Notepad is a text editor that is a component of Microsoft Windows

Indicate whether the statement is true or false

Computer Science & Information Technology

In Excel, the CUMIPMT function calculates the total payments made on a loan

Indicate whether the statement is true or false

Computer Science & Information Technology

____ is a critical extension only applicable for CA certificates. It is composed of two fields called permitted subtrees and excluded subtrees.

A. Name constraints B. Policy mappings C. Policy constraints D. Basic constraints

Computer Science & Information Technology