Communications security involves the protection of which of the following?

A. radio handsets
B. people, physical assets
C. the IT department
D. media, technology, and content

Answer: D

Computer Science & Information Technology

You might also like to view...

________ is the keyboard shortcut to increase the list level in an outline

Fill in the blank(s) with correct word

Computer Science & Information Technology

Privileged EXEC mode is called ____________________ mode because you must enter the enable command to access it.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology