Multiple Choice
The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities.This is done to achieve ________.
A) network security
B) spoofing
C) brute force
D) physical security
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q31: Which of the following is used for
Q44: A _ is a type of virus
Q46: Usurpation occurs when computer criminals invade a
Q64: When referring to security threats, pretexting, sniffing,
Q89: Improper data disclosure and data damage and
Q91: SQL injection attack occurs when users enter
Q97: You are transferring funds online through the
Q99: Which of the following systems procedures is
Q102: _ enable you to access Web sites
Q103: When an employee is terminated, IS administrators