The physical and environmental security domain addresses
A) Activities and procedures required to keep information technology running securely
B) The physical security of information technology components, such as hardware and software
C) Security for telecommunications, networks, and the Internet
D) Security for access to the enterprise system, including computers, networks, routers, and databases
Correct Answer:
Verified
Q71: List and define five access control threats.
Q72: Match the malware with the appropriate definition.
-Viruses
A)Code
Q73: Physical security frameworks are useful to provide
Q74: Which of the following is NOT considered
Q75: What is the purpose of a physical
Q77: _ controls ensure that reports and messages
Q78: IT security management responsibility includes
A)Developing contingency plans
Q79: Which domain covers security for the electrical
Q80: Which authentication method involves analyzing the user's
Q81: Explain the Grandfather-Father-Son method of backing up
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents