A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The
user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen. Which of the following
should be set up to accomplish this?
A. Encryption
B. Compression
C. Permissions
D. Auditing
user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen. Which of the following
should be set up to accomplish this?
A. Encryption
B. Compression
C. Permissions
D. Auditing