Which of the following security concepts would Sara, the security administrator, use to mitigate the risk of data loss?
A. Record time offset
B. Clean desk policy
C. Cloud computing
D. Routine log review
Ans: B. Clean desk policy
Computer Science & Information Technology
You might also like to view...
To find corroborating information on the Web you should always ________with another independent web page.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Which key is used to step into a function?
A. F5 B. F10 C. F11 D. Ctrl-F10
Computer Science & Information Technology
Text can be created in a fixed-width text block or in a single-line text block that extends as you type.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
The name of the control below is ____.Text Color:
A. Text Color: B. TextColor C. 2 D. select name
Computer Science & Information Technology