The process of integrating the governance of the physical security and information security efforts is known in the industry as __________.

A. convergence
B. combination
C. intimation
D. optimization

Answer: A

Computer Science & Information Technology

You might also like to view...

The Interception attack type most commonly affects which principle(s) of the CIA triad?

A. Integrity and Availability B. Confidentiality and Integrity C. Availability D. Integrity E. Confidentiality

Computer Science & Information Technology

The most commonly used public-key algorithm is_______, an encryption system developed in 1977 by MIT professors Ron Rivest, Adi Shamir and Leonard Adleman.

a) PGP. b) RSA. c) PKA. d) None of the above.

Computer Science & Information Technology