This topic contains a solution. Click here to go to the answer

Author Question: ________ security protects computer-based data from software-based and communication-based threats. ... (Read 109 times)

melly21297

  • Hero Member
  • *****
  • Posts: 565
________ security protects computer-based data from software-based and communication-based threats.
 
  A. Infrastructure B. Premises
  C. Physical D. Logical

Question 2

Physical access control should address not just computers and other IS equipment but also locations of wiring used to connect systems, equipment and distribution systems, telephone and communications lines, backup media, and documents.
 
  Indicate whether the statement is true or false.



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

karmakat49

  • Sr. Member
  • ****
  • Posts: 369
Answer to Question 1

D

Answer to Question 2

T




melly21297

  • Member
  • Posts: 565
Reply 2 on: Jul 7, 2018
:D TYSM


rleezy04

  • Member
  • Posts: 322
Reply 3 on: Yesterday
YES! Correct, THANKS for helping me on my review

 

Did you know?

There are major differences in the metabolism of morphine and the illegal drug heroin. Morphine mostly produces its CNS effects through m-receptors, and at k- and d-receptors. Heroin has a slight affinity for opiate receptors. Most of its actions are due to metabolism to active metabolites (6-acetylmorphine, morphine, and morphine-6-glucuronide).

Did you know?

Urine turns bright yellow if larger than normal amounts of certain substances are consumed; one of these substances is asparagus.

Did you know?

The B-complex vitamins and vitamin C are not stored in the body and must be replaced each day.

Did you know?

The FDA recognizes 118 routes of administration.

Did you know?

Human stomach acid is strong enough to dissolve small pieces of metal such as razor blades or staples.

For a complete list of videos, visit our video library