Which of the following security concepts would Sara, the security administrator, use to mitigate the risk of data loss?

A. Record time offset
B. Clean desk policy
C. Cloud computing
D. Routine log review


Ans: B. Clean desk policy

Computer Science & Information Technology

You might also like to view...

To find corroborating information on the Web you should always ________with another independent web page.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which key is used to step into a function?

A. F5 B. F10 C. F11 D. Ctrl-F10

Computer Science & Information Technology

Text can be created in a fixed-width text block or in a single-line text block that extends as you type.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The name of the control below is ____.Text Color: