Multiple Choice
________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alternation, theft, or physical damage to information systems.
A) "Security"
B) "Controls"
C) "Benchmarking"
D) "Algorithms"
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q22: How can a firm's security policies contribute
Q38: _ controls ensure that valuable business data
Q39: Unauthorized access is a security challenge that
Q40: Using numerous computers to inundate and overwhelm
Q41: Public key encryption uses two keys.
Q42: Biometric authentication is the use of physical
Q44: Which of the following is not one
Q45: High-availability computing is also referred to as
Q46: An independent computer program that copies itself
Q48: Which of the following statements about the