Which of the following should not be considered a security best practice?

a. Warning users not to encrypt files
b. Avoiding infections from emails
c. Installing and updating antimalware apps
d. Removing personally identifiable information.

A. File encryption is a security best practice.

Computer Science & Information Technology

You might also like to view...

Table Styles options include all of the following EXCEPT:

A) Heavy. B) Light. C) Best Match for Document. D) Medium.

Computer Science & Information Technology

Which of the following is not included in an exception’s stack trace?

a. A descriptive message for the exception. b. The method-call stack at the time the exception occurred. c. The name of the exception. d. Instructions on handling the exception.

Computer Science & Information Technology