Which of the following represent appropriate steps to protecting data?

A) restrict use to authorized persons for approved purposes
B) decript sensitive data
C) protect passwords or other codes
D) both A & B

D

Computer Science & Information Technology

You might also like to view...

What are the three basic marketing objectives that are applied to blogs?

a. Inform, entertain, become profitable b. Inform, persuade, remind c. Notify, educate, persuade d. Recommend, become profitable, notify

Computer Science & Information Technology

A new calculated field name must be enclosed in brackets

Indicate whether the statement is true or false

Computer Science & Information Technology