which of the following addresses the technology risk of protecting data? a.) leo has special software installed on the company’s intranet to keep information from being accessed by hackers. b.) leo has a programmed schedule for backing up all of the company data before any changes are made to the information system. c.) leo closely monitors his telecommuting employees to ensure they are meeting their required work hours each week. d.) leo coordinates on-site training for his employees when they have to change to a new version of the software they use.