Multiple Choice
The protection of tangible items, objects, or areas from unauthorized access and misuse is known as ___________.
A) communications security
B) network security
C) physical security
D) information security
Correct Answer:

Verified
Correct Answer:
Verified
Q65: A frequently overlooked component of an information
Q66: <u>Hardware</u> is the physical technology that houses
Q67: Network security focuses on the protection of
Q68: A technique used to compromise a system
Q69: The history of information security begins with
Q71: The protection of all communications media, technology,
Q72: The Internet brought _ to virtually all computers
Q73: In the physical design phase, specific technologies are
Q74: The bottom-up approach to information security has
Q75: _ of information is the quality or