A security manager received reports of several laptops containing confidential data stolen out of a lab environment. The lab is not a high security area and is secured with physical key locks. The security manager has no information to provide investigators related to who may have stolen the laptops. Which of the following should the security manager implement to improve legal and criminal investigations in the future?

A. Motion sensors
B. Mobile device management
C. CCTV
D. Cable locks
E. Full-disk encryption


Answer: C. CCTV

Computer Science & Information Technology

You might also like to view...

Resolvers interpret responses from the name servers that they query, regardless of whether those responses contain resource record data or error messages. What are the possible causes of these errors?

What will be an ideal response?

Computer Science & Information Technology

The smallest sum of edge weights between two vertices describes which of the following?

A. the shortest path B. topological order C. topological sort D. maximum spanning tree

Computer Science & Information Technology

ASCII supports languages such as Chinese and Japanese.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

You can overload methods correctly by providing different parameter lists for methods with the same name.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology