Question: Question 6 0 ( 2 points ) Listen The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, transmission, via
Question points
Listen
The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, transmission, via the application of policy, education, training and awareness, and technology is known as
communications security
network security
physical security
information security
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
