simple protection methods need to be employed in order to maintain the security of the equipment….

When using a piece of portable computing equipment or media, regardless if it is being used inside the facility or is being removed for legitimate business outside of the facility, simple protection methods need to be employed in order to maintain the security of the equipment. These consist of .

When using a piece of portable computing equipment or media, regardless if it is being used inside the facility or is being removed for legitimate business outside of the facility, simple protection methods need to be employed in order to maintain the security of the equipment. These consist of .

A.
cable locks, encryption, password protection, and increased awareness *

B.
reducing vulnerability by protecting, off setting, or transferring the risk

C.
operational readiness, physical protection systems, and standard operating processes

D.
increase awareness, environmental design, and physical security

Explanation:
When using a piece of portable computer equipment or media, regardless if it is being used inside the facility or is being removed for legitimate business outside of the facility, simple protection methods need to be employed in order to maintain the security of the equipment: use a cable lock, do not leave the equipment unattended or unsecured, use strong passwords, and encrypt data. Page 655.



Leave a Reply 1

Your email address will not be published. Required fields are marked *


joe

joe

cable locks, encryption, password protection, and increased awareness

電纜鎖,加密,密碼保護,以及提高認識*