Which of the following mitigates the risk of proprietary information being compromised?
A. Cloud computing
B. Digital signatures
C. File encryption
D. Virtualization
Ans: C. File encryption
You might also like to view...
Describe the Bring your own device (BYOD) deployment model.
What will be an ideal response?
All of the following are arithmetic operators used in Excel, except _____.
A. x (multiplication) B. ^ (exponent) C. % (percent) D. + (addition)
When you create a set of pages that presents information in two levels of detail, the ____ page lists all the records in the recordset that you create for the page.
A. master B. outer C. nested D. detail
When a company completes a background check, the company must comply with the ________ regulations
A) Privacy Act of 1974 B) Freedom of Information Act (FOIA) C) Fair Credit Reporting Act (FCRA) D) Free Flow of Information Act 2013