Which of the following can be implemented to reduce the risk of this information becoming compromised in this scenario?
Which of the following security methods can provide protection against tour participants viewing sensitive information at minimal cost?
Which of the following access control methods is MOST appropriate for preventing such occurrences in the future?
Which of the following is the MOST appropriate control for the architect to focus onto ensure confidentiality of data stored on laptops?