Which of the following security concepts would Sara, the security administrator, use to
mitigate the risk of data loss?
A.
Record time offset
B.
Clean desk policy
C.
Cloud computing
D.
Routine log review
Which of the following security concepts would Sara, the security administrator, use to
mitigate the risk of data loss?
Which of the following security concepts would Sara, the security administrator, use to
mitigate the risk of data loss?
A.
Record time offset
B.
Clean desk policy
C.
Cloud computing
D.
Routine log review
Why not C.
Thats risk Transference.