What is a good policy to have to protect corporate data stored on employee laptops?
A) Encrypt the hard drive.
B) Require a login PIN.
C) Connect through a VPN before storing data locally.
D) Require a password of 8 characters or more.
A
You might also like to view...
Which of the following is a difference between the read and write functions?
a. One performs formatted I/O and the other does not. b. They take different types of parameters. c. write and gcount are member functions of the same class, whereas read is not. d. The failbit is set only with read.
Which of the following requirements is part of the “Implement strong access control measures” PCI DSS core principle?
A) Restrict access to cardholder data by business need-to know. B) Develop and maintain secure systems and applications. C) Protect all systems against malware and regularly update antivirus software. D) Encrypt transmission of cardholder data across open, public networks. Answer: A
In UNIX/Linux, a mapped drive is called a ____ volume.
A. logical B. mounted C. virtual D. partitioned
Researchers are experimenting with a combination of DNA molecules and carbon nanotubes to make smaller, more powerful, and more energy-efficient computer chips.
Answer the following statement true (T) or false (F)