The process of integrating the governance of the physical security and information security efforts is known in the industry as __________.
A. convergence
B. combination
C. intimation
D. optimization
Answer: A
Computer Science & Information Technology
You might also like to view...
The Interception attack type most commonly affects which principle(s) of the CIA triad?
A. Integrity and Availability B. Confidentiality and Integrity C. Availability D. Integrity E. Confidentiality
Computer Science & Information Technology
The most commonly used public-key algorithm is_______, an encryption system developed in 1977 by MIT professors Ron Rivest, Adi Shamir and Leonard Adleman.
a) PGP. b) RSA. c) PKA. d) None of the above.
Computer Science & Information Technology