Which of the following requires special handling and explicit policies for data retention and data
distribution?
A.
Personally identifiable information
B.
Phishing attacks
C.
Zero day exploits
D.
Personal electronic devices
Explanation:
Which of the following requires special handling and explicit policies for data retention and data
distribution?
Which of the following requires special handling and explicit policies for data retention and data
distribution?
A.
Personally identifiable information
B.
Phishing attacks
C.
Zero day exploits
D.
Personal electronic devices
Explanation: