ISC Exam Questions

Which of the following is the MOST effective method of mitigating data theft from an active user wor

Which of the following is the MOST effective method of mitigating data theft from an active user
workstation?

A.
Implement full-disk encryption

B.
Enable multifactor authentication

C.
Deploy file integrity checkers

D.
Disable use of portable devices