A software developer places a copy of the source code for a sensitive internal application on a company laptop to work remotely. Which of the following policies is MOST likely being violated?

A. Clean desk
B. Data handling
C. Chain of custody
D. Social media

Answer: B. Data handling

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1) Stream manipulator showpoint forces floating-point values to print with the default six digits of precision unless the precision value has been changed, in which case floating-point values print with the specified precision. 2) The ostream member function put outputs the specified number of characters. 3) The stream manipulators dec, oct and hex affect only the next integer output operation. 4) By default, memory addresses are displayed as long integers.

Computer Science & Information Technology

A data ____ is an explanation of how the pieces of data relate to each other.

A. glossary B. model C. rating D. matrix

Computer Science & Information Technology