a) network security
b) physical security
c) database security
d) wireless security
Answer: b
Explanation: When cyber-criminal gain access to an authorized area and steal pen drives and DVDs which contain sensitive information about an employee or about the organization, then it can be said that the physical security of the organization is weak.
Related Posts
The ________ function can be used to create vectors of objects by concatenating things together.
What will be the output of the following R code?
> x <- vector(“numeric”, length = 10)
> xWhich of the following can be considered as object attribute?
R objects can have attributes, which are like ________ for the object.
Attributes of an object (if any) can be accessed using the ______ function.
Point out the correct statement?
If you explicitly want an integer, you need to specify the _____ suffix.
Join The Discussion