What is a good policy to have to protect corporate data stored on employee laptops?

A) Encrypt the hard drive.
B) Require a login PIN.
C) Connect through a VPN before storing data locally.
D) Require a password of 8 characters or more.


A

Computer Science & Information Technology

You might also like to view...

Which of the following is a difference between the read and write functions?

a. One performs formatted I/O and the other does not. b. They take different types of parameters. c. write and gcount are member functions of the same class, whereas read is not. d. The failbit is set only with read.

Computer Science & Information Technology

Which of the following requirements is part of the “Implement strong access control measures” PCI DSS core principle?

A) Restrict access to cardholder data by business need-to know. B) Develop and maintain secure systems and applications. C) Protect all systems against malware and regularly update antivirus software. D) Encrypt transmission of cardholder data across open, public networks. Answer: A

Computer Science & Information Technology

In UNIX/Linux, a mapped drive is called a ____ volume.

A. logical B. mounted C. virtual D. partitioned

Computer Science & Information Technology

Researchers are experimenting with a combination of DNA molecules and carbon nanotubes to make smaller, more powerful, and more energy-efficient computer chips.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology