Which one of the following is not required to protect laptops taken off premises?
A. Laptops should never be left unattended
B. All sensitive information should be removed
C. No credentials should be requested to start or access laptops.
D. They should first be logged out then logged in when returned
C. No credentials should be requested to start or access laptops.
You might also like to view...
To place, or ________ an icon to the taskbar allows quick, single-click access to the program
Fill in the blank(s) with correct word
New to Windows 8, ________ are buttons that provide access to useful functions
A) snips B) icons C) gestures D) Charms
Name at least two command-line tools that can be used to determine connectivity to another host.
What will be an ideal response?
For a two-dimensional array, values are stored ____________ using a row major format.
Fill in the blank(s) with the appropriate word(s).