Which of the following is a way to implement a technical control to mitigate data loss in case of a
mobile device theft?
A.
Disk encryption
B.
Encryption policy
C.
Solid state drive
D.
Mobile device policy
Which of the following is a way to implement a technical control to mitigate data loss in case of a
mobile device theft?
Which of the following is a way to implement a technical control to mitigate data loss in case of a
mobile device theft?
A.
Disk encryption
B.
Encryption policy
C.
Solid state drive
D.
Mobile device policy