drozdvadim8104 drozdvadim8104 10-12-2022 Engineering contestada Which of the following is a good security practice in areas where classified information may be subject to unauthorized disclosure?