Multiple Choice
On March 3,2008,a laptop computer belonging to Folding Squid Technology was stolen from the trunk of Jiao Jan's car while he was attending a conference in Cleveland,Ohio.After reporting the theft,Jiao considered the implications of the theft for the company's network security and concluded there was nothing to worry about because
A) the computer was protected by a password.
B) the computer was insured against theft.
C) it was unlikely that the thief would know how to access the company data stored on the computer.
D) the data stored on the computer was encrypted.
Correct Answer:

Verified
Correct Answer:
Verified
Q1: Which of the following is not associated
Q5: Jeff Davis took a call from a
Q6: A process that takes plaintext of any
Q7: Jeff Davis took a call from a
Q8: These systems use the same key to
Q9: Which of the following describes one weakness
Q11: These are used to create digital signatures.<br>A)
Q23: Information encrypted with the creator's private key
Q27: The system and processes used to issue
Q37: In developing policies related to personal information