Which one of the following is not required to protect laptops taken off premises?

A. Laptops should never be left unattended
B. All sensitive information should be removed
C. No credentials should be requested to start or access laptops.
D. They should first be logged out then logged in when returned


C. No credentials should be requested to start or access laptops.

Computer Science & Information Technology

You might also like to view...

Set tabs to align content in the document

Indicate whether the statement is true or false

Computer Science & Information Technology

A meaningless sequence of gibberish or cryptic symbols can be a string, and there is virtually no limit to the length of a string.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What task(s) should you perform as soon as you finish configuring a router? (Select all that apply.)

A. traceroute B. back up the router configuration C. document how you configured the router D. turn on dynamic routing E. both C and B

Computer Science & Information Technology

The default Photoshop type size is ____________________ points.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology