A security architect is designing an enterprise solution for the sales force of a corporation which handles sensitive customer data. The solution must allow users to work from remote offices and support traveling users. Which of the following is the MOST appropriate control for the architect to focus onto ensure confidentiality of data stored on laptops?
A. Full-disk encryption
B. Digital sign
C. Federated identity management
D. Cable locks
Answer: A. Full-disk encryption
You might also like to view...
The format specifier ___________ is used to output values of type float or double.
Fill in the blank(s) with the appropriate word(s).
Design the CHANGE SOFTWARE display screen. This allows Cher Ware to modify data that have been entered incorrectly, as well as information that routinely changes, such as SOFTWARE EXPERT and NUMBER OF COPIES. The SOFTWARE INVENTORY NUMBER is the primary key and may not be changed. The other SOFTWARE MASTER fields that should be included on the screen are found in the repository data structure called SOFTWARE CHANGES. Use these fields to design the display screen. A limited display screen, CHANGE SOFTWARE RECORD, has been created in Access. Use the Access Field List to add fields to it. Include the following buttons: Find, Find Next, Previous Record, Next Record, Save Record, and Cancel Changes.
What will be an ideal response?
Android is not as open as Linux, but is much more open than the operating system that runs Apple's mobile products.
Answer the following statement true (T) or false (F)
A clerk embezzles customer payments on account and covers up the theft by making an adjustment to the accounts receivable ledger. Describe a specific internal control procedure that would prevent this fraud.
What will be an ideal response?