Multiple Choice
All of the following are good rules for employees to follow for data security purposes, except ____.
A) don't take diskettes or other storage media out of the building
B) avoid using public key encryption because of the insecure nature of transmitting keys
C) don't write your computer password down anywhere
D) don't respond to any unusual requests for information about the computer system from anyone over the telephone
E) logoff your computer or at least lock your office door when you leave your office, even for just a few minutes
Correct Answer:

Verified
Correct Answer:
Verified
Q49: Forward recovery is used to recreate a
Q50: A proxy server is firewall software that
Q51: All of the following are characteristics of
Q52: Of the following choices, the most advisable
Q53: Data that has been encrypted has to
Q55: All of the following are methods of
Q56: Backward recovery uses as inputs the log
Q57: The lost update problem can occur when
Q58: A computer virus is a malicious piece
Q59: Stealing disks is a method of breaching