Multiple Choice
Security for computer systems must include strategies to protect:
A) Computer equipment.
B) Computer software.
C) Information contained in a computer database.
D) Computer databases.
E) All of the above.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q24: _ should be utilized to secure computer
Q25: Define and contrast critical information, proprietary information,
Q26: Converting plain text to crypto text is
Q27: Threats to critical information include:<br>A) Environmental and
Q28: Interception of emanations can be prevented if
Q30: Cryptographic security should not be viewed as
Q31: At the United States government level, enforcement
Q32: The _ regulates private industry's access to
Q33: _ agreements are used to prevent release
Q34: The purpose of _ is to protect