Physical security includes which of the following?

a. Securing the servers and workstations
b. Controlling access to the company facilities
c. Responding to fires
d. All the above


ANS: D

Computer Science & Information Technology

You might also like to view...

A procedure for solving a problem is called a(n) _________ .

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A(n) ____ is any clearly identified attack on the organization's information assets that would threaten the assets' confidentiality, integrity, or availability.

A. event B. incident C. trigger D. RAID occurrence

Computer Science & Information Technology

A dialog box is similar to a window, but is used for a specific purpose and requires an action by the user

Indicate whether the statement is true or false

Computer Science & Information Technology

Converting the color mode to Grayscale is an example of ____________________ editing, because all of the original color information is discarded.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology