A security manager received reports of several laptops containing confidential data stolen out of a lab environment. The lab is not a high security area and is secured with physical key locks. The security manager has no information to provide investigators related to who may have stolen the laptops. Which of the following should the security manager implement to improve legal and criminal investigations in the future?
A. Motion sensors
B. Mobile device management
C. CCTV
D. Cable locks
E. Full-disk encryption
Answer: C. CCTV
You might also like to view...
Resolvers interpret responses from the name servers that they query, regardless of whether those responses contain resource record data or error messages. What are the possible causes of these errors?
What will be an ideal response?
The smallest sum of edge weights between two vertices describes which of the following?
A. the shortest path B. topological order C. topological sort D. maximum spanning tree
ASCII supports languages such as Chinese and Japanese.
Answer the following statement true (T) or false (F)
You can overload methods correctly by providing different parameter lists for methods with the same name.
Answer the following statement true (T) or false (F)