The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or transmission, via the application of policy, education, training and awareness, and technology is known as ___________.

A. ?communications security 
B. ?network security
C. ?physical security
D. ?information security

Answer: D

Computer Science & Information Technology

You might also like to view...

A(n) ________ is a smaller version of an image

Fill in the blank(s) with correct word

Computer Science & Information Technology

You can determine the number of elements in a two-dimensional array by multiplying the number of its rows by the number of its columns.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology