Computer security strategies in the form of ________ can be implemented to maintain accountability for those who have legitimate access to a computer system or database.
A) Logical controls
B) Administrative controls
C) Data encryption
D) Firewalls
E) All of the above.
Correct Answer:
Verified
Q12: _ agreements are used to prevent release
Q13: _ includes all efforts to protect information
Q14: Communications _ security involves prevention of adverse
Q15: _ security involves the use of non-exclusive
Q16: Security for computer systems must include strategies
Q18: The _ is an FBI-maintained computer security
Q19: At the United States government level, enforcement
Q20: The _ regulates private industry's access to
Q21: _ pose(s) security risks and challenges for
Q22: Digitized information is not distance- or time-dependent.
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents