"GGG security" is a term commonly used to describe which aspect of security?

A. technical
B. software
C. physical
D. policy


Answer: C

Computer Science & Information Technology

You might also like to view...

________ studies the relationship between workers and their workspaces

A) Moore's Law B) Universal design C) Green computing D) Ergonomics

Computer Science & Information Technology

The ________ level of Bloom's Taxonomy refers to the ability to demonstrate an understanding of the facts and terminology. Some typical verbs used in comprehension-based objectives are match, explain, restate,paraphrase, rewrite, summarize, and illustrate

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following can be used to prevent routing table pollution?

A. router authentication B access control lists C. GRE tunnels D. restricting zone transfers

Computer Science & Information Technology

The primary purpose of an application letter is to get a(n) ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology