A software developer places a copy of the source code for a sensitive internal application on a company laptop to work remotely. Which of the following policies is MOST likely being violated?
A. Clean desk
B. Data handling
C. Chain of custody
D. Social media
Answer: B. Data handling
You might also like to view...
Why is a prime number used in the Rabin-Karp algorithm?
a. It is used to generate a safe, efficient hash b. It is used to calculate the optimal size of the queue c. It is used to calculate the height of a binary search tree d. It is used to determine the array size used by the string
Pages of the body of the report are numbered at the top right.
Answer the following statement true (T) or false (F)
A ____ extracts specific information from a database by specifying particular conditions (called criteria) about the data you would like to retrieve.
A. form B. query C. macro D. view
What type of functions allow large and complex programs to be broken into small and manageable tasks?
A. Program-defined B. Built-in C. Value-returning D. Void