Joe, a technician, is working remotely with his company provided laptop at the coffee shop near his home. Joe is concerned that another patron of the coffee shop may be trying to access his laptop.Which of the following is an appropriate control to use to prevent the other patron from accessing Joe's laptop directly?

A. full-disk encryption
B. Host-based firewall
C. Current antivirus definitions
D. Latest OS updates


Answer: B. Host-based firewall

Computer Science & Information Technology

You might also like to view...

A(n) ________ is used to mark specific positions for text alignment

A) text box B) indent C) tab stop D) margin

Computer Science & Information Technology

Your Mac is running extremely slowly. What utility can be used to see CPU and memory usage data?

A) Task Manager B) Activity Monitor C) Console diagnostics D) System Information

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. External storage exists after program execution. 2. Generally there is less external storage than internal memory. 3. Without direct access files, it would be impossible to support the data-management operations efficiently in an external environment. 4. A file of integer records will have less records per block than a file of student records. 5. According to the text, you can read and write a block of records, but you cannot read or write an individual record.

Computer Science & Information Technology

How would you display a list of utilities that compress files?

What will be an ideal response?

Computer Science & Information Technology