Multiple Choice
Methods you should use to protect your portable devices and information include all of the following except:
A) Using two-factor authentication
B) Making certain not to leave your portable devices in plain view in a car
C) Keeping your portable devices in an inconspicuous container
D) Encrypting the hard drive of your laptop
E) All of these are legitimate protection methods.
Correct Answer:

Verified
Correct Answer:
Verified
Q42: Describe the functions of anti-malware software on
Q43: Why is it so important to protect
Q44: _ software logs keystrokes, e-mails, applications, windows,
Q45: Which of the following statements is not
Q46: _ is an example of a computer-based
Q48: Discuss the pros and cons of using
Q49: Which of the following attacks is most
Q50: The first step to recover from identity
Q51: What functions should you expect from monitoring
Q52: What functions should a personal firewall provide