What is the best way to protect against data loss on a stolen Windows 7 business laptop?

A) Use a USS.
B) Use a biometric device.
C) Use three-way authentication.
D) Use BitLocker.


D

Computer Science & Information Technology

You might also like to view...

Dead processes in the process table are called_________ .

a) ghosts. b) vampires. c) zombies. d) None of the above.

Computer Science & Information Technology

The ________ is part of the processor that manages the movement of data through the CPU

a.arithmetic logic unit b.control unit c.data bus d.peripheral device

Computer Science & Information Technology

Languages in which arrays are objects, including JavaScript, implement a two-dimensional array as an array of arrays, so separate brackets must be used for the subscripts.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

TheinitializeEventListeners screen is the place where event listeners and their handlers are specified.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology