Which of the following security tools can Jane, an administrator, implement to mitigate the risks of theft?

A. Virtualization
B. Host based firewalls
C. HIPS
D. Device encryption


Answer: D. Device encryption

Computer Science & Information Technology

You might also like to view...

During a mail merge, the ________ document contains the text that will remain constant in all of the resulting letters or labels

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which one of these apps cannot be used as a text editor?

a. Apple Text Edit b. BB Edit 10 c. Microsoft Word d. Notepad ++

Computer Science & Information Technology

When connecting an old HDTV without a HDMI port to a DVD player, which of the following cables would provide the best picture quality?

a. Composite b. S-video c. USB d. Component

Computer Science & Information Technology

OR queries narrow the number of records that will appear in the datasheet because a record must be true for all criteria.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology