A software developer places a copy of the source code for a sensitive internal application on a company laptop to work remotely. Which of the following policies is MOST likely being violated?

A. Clean desk
B. Data handling
C. Chain of custody
D. Social media


Answer: B. Data handling

Computer Science & Information Technology

You might also like to view...

Why is a prime number used in the Rabin-Karp algorithm?

a. It is used to generate a safe, efficient hash b. It is used to calculate the optimal size of the queue c. It is used to calculate the height of a binary search tree d. It is used to determine the array size used by the string

Computer Science & Information Technology

Pages of the body of the report are numbered at the top right.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A ____ extracts specific information from a database by specifying particular conditions (called criteria) about the data you would like to retrieve.

A. form B. query C. macro D. view

Computer Science & Information Technology

What type of functions allow large and complex programs to be broken into small and manageable tasks?

A. Program-defined B. Built-in C. Value-returning D. Void

Computer Science & Information Technology