Multiple Choice
Methods you should use to protect your portable devices and information include all of the following except:
A) Using two-factor authentication.
B) Making certain not to leave your portable devices in plain view in a car.
C) Keeping your portable devices in an inconspicuous container.
D) Encrypting the hard drive of your laptop.
E) All of the above are legitimate protection methods.
Correct Answer:

Verified
Correct Answer:
Verified
Q5: What functions should you expect from content-filtering
Q6: A _ cookie either originates on, or
Q10: A single-cut shredder is sufficient to shred
Q12: Virtual credit cards cannot be used for
Q19: Personal firewalls perform all of the following
Q20: You should ask whether your Social Security
Q20: It is OK to open an e-mail
Q24: Which of the following is a good
Q25: A _ cookie either originates on, or
Q37: One strategy for controlling spam is to