Answer:
To be inspected line by line.
Explanation:
The containment strategy prevents intruders from removing
information assets from the network, and
prevents attackers from using the organization's network as a launch point
for subsequent attacks.
In
a "block" containment strategy, in which the attacker's path into the
environment is disrupted, you should use the most precise strategy
possible, starting with <span>blocking a specific IP address. Correct answer: C
</span>
Tony uses the Document Inspector dialog box to <u>remove confidential company information</u> from the presentation.
Explanation:
Document Inspector dialogue box has come as boon to the presentation and office document makers. This saves them from any discrepancies’ regarding revealing any sensitive information, unwanted information, hidden data’s etc.
These information’s if released can be a matter of concern for the employee as well as an organisation. Document inspector prevents an employee from later embarrassment and any legal troubles arising out of his actions.
Hence, Tony who is in charge of Fortune 500 pharma company decided to use Document Inspector dialogue box to make sure that his presentation his complete in all aspects of professionalism and is bereft of any sensitive and unwarranted information.
Its to delete the files from the computer that you no longer want. Once its put in the recycling bin it stays there, then when you empty it, its off your computer and there is no way you can get those files back. This can also free-up some space from your computer since mega and giga bites are being removed from your computer.