In case of loss or theft, which of the following methods is used to prevent corporate-based data
being compromised?
A.
Access control list
B.
Password policy
C.
Firewall
D.
Full-disk encryption
Explanation:
In case of loss or theft, which of the following methods is used to prevent corporate-based data
being compromised?
In case of loss or theft, which of the following methods is used to prevent corporate-based data
being compromised?
A.
Access control list
B.
Password policy
C.
Firewall
D.
Full-disk encryption
Explanation: