Banning of personally owned electronic devices at work BEST strengthens which of the following security principles?

A. Encourages hard drive encryption
B. Impedes shoulder surfing
C. Prevention of data leakage
D. Decreases workplace disruption


Ans: C. Prevention of data leakage

Computer Science & Information Technology

You might also like to view...

What technology gets its name from the notion that it ignores the traditional A, B, and C class designations for IP addresses?

A. Route aggregation B. Address masquerading C. NAT D. Classless Inter-Domain Routing

Computer Science & Information Technology

Microsoft ________ is a database program that manages database files

Fill in the blank(s) with correct word

Computer Science & Information Technology

In many networks, one or more computers act as a server.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When questions about a record come about, the file that is most import to check is:

a. Transaction file. b. Activity file. c. Old master file. d. Backup file. e. None of the above.

Computer Science & Information Technology