Multiple Choice
The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or transmission, via the application of policy, education, training and awareness, and technology is known as ___________.
A) communications security
B) network security
C) physical security
D) information security
Correct Answer:

Verified
Correct Answer:
Verified
Q29: A(n) _ is a formal approach to
Q30: The probability of an unwanted occurrence, such
Q31: The water-ski model is a type of SDLC
Q32: An emerging methodology to integrate the effort of
Q33: A champion is a project manager, who
Q35: Organizations are moving toward more _-focused development
Q36: A type of SDLC in which each
Q37: A methodology and formal development strategy for the design
Q38: A computer is the _ of an
Q39: A potential weakness in an asset or