Answer the following statements true (T) or false (F)

1. To implement a physical security program an organization must conduct a risk assessment to determine the amount of resources to devote to physical security and the allocation of those resources against the various threats.
2. Physical security must also prevent any type of physical access or intrusion that can compromise logical security.
3. For information systems, the role of logical security is to protect the physical assets that support the storage and processing of information.
4. Physical security must prevent misuse of the physical infrastructure that leads to the misuse or damage of the protected information.
5. Misuse of the physical infrastructure includes vandalism, theft of equipment, theft by copying, theft of services, and unauthorized entry.




1. True
2. True
3. False
4. True
5. True

Computer Science & Information Technology

You might also like to view...

Which management frame type is sent by a station wanting to terminate the connection?

A. Deauthentication B. Disassociation C. Reassociation request D. Probe response

Computer Science & Information Technology

When columns do not line up in Word, you can insert a(n) ________ to end a column so that the columns line up

Fill in the blank(s) with correct word

Computer Science & Information Technology

In determining whether a system is adequately protected from attacks by computer viruses, all of the following policies are relevant except

A. the policy on the purchase of software only from reputable vendors B. the policy that all software upgrades are checked for viruses before they are implemented C. the policy that current versions of antivirus software should be available to all users D. the policy that permits users to take files home to work on them

Computer Science & Information Technology

The ___________________ method is used to change the direction an object is facing.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology