The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or transmission, via the application of policy, education, training and awareness, and technology is known as ___________.
A. ?communications security
B. ?network security
C. ?physical security
D. ?information security
Answer: D
Computer Science & Information Technology
You might also like to view...
A(n) ________ is a smaller version of an image
Fill in the blank(s) with correct word
Computer Science & Information Technology
You can determine the number of elements in a two-dimensional array by multiplying the number of its rows by the number of its columns.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology