A user’s laptop hard drive contains sensitive information. The user often plugs the laptop
into the corporate network. A sensitive file from the laptop has been found on another user’s
laptop. How could the user have prevented this breach?
A.
Delete unused drives from network.
B.
Remove shared keys from the key ring.
C.
Set the read-only attribute on the files.
D.
Disable file and print sharing on the laptop.