Secure shredding, degaussing, and sanitizing are methods used to securely dispose of electronic or physical PHI
Indicate whether the statement is true or false
True
Computer Science & Information Technology
You might also like to view...
Linux uses ________ to support authentication via interfaces including smart cards, Kerberos and voice authorization systems.
a) Linux security modules (LSMs) b) mandatory access control (MAC) c) pluggable authentication modules (PAMs) d) SELinux
Computer Science & Information Technology
Data from an Access query cannot be exported into a file that can be opened by Excel
Indicate whether the statement is true or false
Computer Science & Information Technology
You use the Style Pane Options dialog box to change how styles display in the Styles pane
Indicate whether the statement is true or false
Computer Science & Information Technology
What are some of the characteristics of weak passwords?
What will be an ideal response?
Computer Science & Information Technology