Briefly describe the two steps related to physical security.
What will be an ideal response?
Physical security is a two-step process:
• First, prevent and control access to IT resources to appropriate personnel.
• Second, track the actions of those authorized (and sometimes unauthorized) personnel.
You might also like to view...
Personnel security is meant to address ____________________ threats.
Fill in the blank(s) with the appropriate word(s).
Which of the following statements is true about this line?
Consider the following line of code. ``` Comparable s = new String(); ``` a) It will result in a compile-time error. b) It will result in a run-time error. c) It will create a String object pointed to by a Comparable reference. d) Although it is perfectly valid Java, it should be avoided due to confusion. e) none of the above are true
Consider a class PersonAddress that represents an entry in an address book. Its attributes are
• The first name of the person • The last name of the person • The e-mail address of the person • The telephone number of the person It will have methods to • Access each attribute • Change the e-mail address • Change the telephone number • Test whether two instances are equal based solely on name a. Write a method heading for each method. b. Write preconditions and postconditions for each method. c. Write some Java statements that test the class. d. Implement the class.
?One of the main activities in the systems analysis phase is _____, which involves fact-finding to describe the current system and identification of the specifications for the new system.
A. ?objective modeling B. ?requirements modeling C. ?goal-based modeling D. ?user-based modeling