Why can it be problematic when the people who are responsible for the overall security of the organization do not always view information assets in the same way as physical assets?
What will be an ideal response?
The steps that are taken to ensure physical protection of information processing facilities and equipment can be badly coordinated with the things that are done to protect the information itself. Worse yet, because information can be viewed as "different," the responsibility to protect the equipment that it resides on might be left to the information technology function rather than physical security. Since information technology managers are not oriented toward protecting tangible assets, that assumption can result in no physical security at all.
You might also like to view...
What is the name of the string with no characters?
What will be an ideal response?
The ____________________ is a temporary holding area in your computer's memory.
Fill in the blank(s) with the appropriate word(s).
____ filters create cloud patterns, texture fills, 3-D shapes, refraction patterns, and simulated light reflections in an image.
a. Puppet Warp b. Distort c. Render d. Gallery
A standard vSphere virtual switch can have a maximum of 120 ports.
Answer the following statement true (T) or false (F)