CONFIGURE SYNCHRONIZATION MANAGER

2. When she is running the exhibit booth at tradeshows, Iris’ attention is often

diverted, and she is worried that she cannot always keep an eye on her notebook

computer. The computer contains trade secrets that she does not want to see com-

promised. Iris wants to secure the files on her computer, even if the computer is

stolen. Can you configure encryption on her notebook computer? If so, what pre-

cautions should you take?