Multiple Choice
Computer security strategies in the form of ________ can be implemented to maintain accountability for those who have legitimate access to a computer system or database.
A) Logical controls
B) Administrative controls
C) Data encryption
D) Firewalls
E) All of the above.
Correct Answer:

Verified
Correct Answer:
Verified
Q2: _ property is defined as information created
Q3: _ involves information risk assessment and intelligence
Q4: INFOSEC views operations from an adversary's perspective
Q5: Computer crime is generally defined as any
Q6: _ security involves the use of non-exclusive
Q7: Communications _ security involves prevention of adverse
Q8: According to the United States _, critical
Q9: The _ involves collaboration among several organizations
Q10: What is the purpose of information security
Q11: _ includes all efforts to protect information