Which of the following security concepts would Sara, the security administrator, use to mitigate the
risk of data loss?
A.
Record time offset
B.
Clean desk policy
C.
Cloud computing
D.
Routine log review
Which of the following security concepts would Sara, the security administrator, use to mitigate the
risk of data loss?
Which of the following security concepts would Sara, the security administrator, use to mitigate the
risk of data loss?
A.
Record time offset
B.
Clean desk policy
C.
Cloud computing
D.
Routine log review