In case of loss or theft, which of the following methods is used to prevent corporate-based data being compromised?
A. Access control list
B. Password policy
C. Firewall
D. Full-disk encryption
In case of loss or theft, which of the following methods is used to prevent corporate-based data being compromised?
A. Access control list
B. Password policy
C. Firewall
D. Full-disk encryption