Which of the following security tools can Jane, an administrator, implement to mitigate the risks of theft?
A. Virtualization
B. Host based firewalls
C. HIPS
D. Device encryption
Answer: D. Device encryption
Computer Science & Information Technology
You might also like to view...
During a mail merge, the ________ document contains the text that will remain constant in all of the resulting letters or labels
Fill in the blank(s) with correct word
Computer Science & Information Technology
Which one of these apps cannot be used as a text editor?
a. Apple Text Edit b. BB Edit 10 c. Microsoft Word d. Notepad ++
Computer Science & Information Technology
When connecting an old HDTV without a HDMI port to a DVD player, which of the following cables would provide the best picture quality?
a. Composite b. S-video c. USB d. Component
Computer Science & Information Technology
OR queries narrow the number of records that will appear in the datasheet because a record must be true for all criteria.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology