Which of the following is the BEST mechanism to prevent data loss in the event personal computing equipment is stolen or lost?
A. Data encryption
B. Remote access to device
C. Data leakage prevention (DLP)
D. Personal firewall
A. Data encryption
B. Remote access to device
C. Data leakage prevention (DLP)
D. Personal firewall