Which one of the following is not required to protect laptops taken off premises?

A. Laptops should never be left unattended
B. All sensitive information should be removed
C. No credentials should be requested to start or access laptops.
D. They should first be logged out then logged in when returned


C. No credentials should be requested to start or access laptops.

Computer Science & Information Technology

You might also like to view...

To place, or ________ an icon to the taskbar allows quick, single-click access to the program

Fill in the blank(s) with correct word

Computer Science & Information Technology

New to Windows 8, ________ are buttons that provide access to useful functions

A) snips B) icons C) gestures D) Charms

Computer Science & Information Technology

Name at least two command-line tools that can be used to determine connectivity to another host.

What will be an ideal response?

Computer Science & Information Technology

For a two-dimensional array, values are stored ____________ using a row major format.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology