________ security protects computer-based data from software-based and communication-based threats.
A. Infrastructure B. Premises
C. Physical D. Logical
D. Logical
Computer Science & Information Technology
You might also like to view...
To concatenate values in an expression, an asterisk should be entered between the values to be concatenated
Indicate whether the statement is true or false
Computer Science & Information Technology
Notepad is a text editor that is a component of Microsoft Windows
Indicate whether the statement is true or false
Computer Science & Information Technology
In Excel, the CUMIPMT function calculates the total payments made on a loan
Indicate whether the statement is true or false
Computer Science & Information Technology
____ is a critical extension only applicable for CA certificates. It is composed of two fields called permitted subtrees and excluded subtrees.
A. Name constraints B. Policy mappings C. Policy constraints D. Basic constraints
Computer Science & Information Technology