A company is concerned about the theft of client data from decommissioned laptops. Which of the following is the most cost-effective method to decrease this risk?
Which of the following is a vulnerability concern for end-of-life hardware?
Which of the following would best allow a company to prevent access to systems from the Internet?
Which of the following phases of the incident response process attempts to minimize disruption?