____ are the physical areas that the organization has chosen to certify as secure.

A. Secure perimeters
B. Secure boundaries
C. Secure spaces
D. Secure zones

Answer: C

Computer Science & Information Technology

You might also like to view...

The second principle of good database design is to use techniques that ensure ________ occurs when it is entered into the table.

a. a common field b. redundant data c. normalization d. a flat database

Computer Science & Information Technology

Values are commonly stored in a binary search tree so that a node's ________ child holds data that is less than the ________ data, while the node's data is less than the data in the other child.

A) right, node's B) left, node's C) right, left child's D) left, right child's E) None of the above

Computer Science & Information Technology