Which security control should your organization implement to ensure that data placed on a flash drive cannot be accessed by unauthorized personnel?

A. Require that all flash drives be configured with ACLs.
B. Require that all flash drives be configured with rules.
C. Require that all flash drives be configured with MAC filters.
D. Require that all flash drives be configured with encryption.

D

Explanation: You should require that all flash drives be configured with encryption to ensure that data placed on a flash drives cannot be accessed by unauthorized personnel.

Computer Science & Information Technology

You might also like to view...

When using the Twirl filter, you can adjust the angle of the twirl, which makes the image look like it is moving or spinning.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Explain what a proof is and discuss the use of proofs in the printing process.

What will be an ideal response?

Computer Science & Information Technology