which of the following methods is used to prevent corporate-based data being compromised?

In case of loss or theft, which of the following methods is used to prevent corporate-based data
being compromised?

In case of loss or theft, which of the following methods is used to prevent corporate-based data
being compromised?

A.
Access control list

B.
Password policy

C.
Firewall

D.
Full-disk encryption

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *