Which of the following is the MOST effective method of mitigating data theft from an active user workstation?

Which of the following is the MOST effective method of mitigating data theft from an active user
workstation?

Which of the following is the MOST effective method of mitigating data theft from an active user
workstation?

A.
Implement full-disk encryption

B.
Enable multifactor authentication

C.
Deploy file integrity checkers

D.
Disable use of portable devices



Leave a Reply 0

Your email address will not be published. Required fields are marked *

one × five =