Which of the following is a good practice for protecting computing devices ?

i. Finding a central accessible physical space for computers, portable devices, and any removable storage media.

ii. Assuming the purchasing department verified that the commercial vendor anti-virus/anti-spyware and firewall software is installed as appropriate.

iii. Login and screen-saver passwords, or token or biometric mechanisms, are disabled to make it easier to use the device quickly.

iv. Ensuring anti-virus and other software is kept up-to-date. That includes keeping up with patches for the operating system itself, and upgrades to whatever browser and email software is used.

Q&A Education