Which of the following should be done when an employee leaves the company?

a. All logon accounts to servers, VPNs, and network resources should be disabled.
b. All keys to the facilities should be returned.
c. All accounts for emails and cell phones should be shut off.
d. All the above.


ANS: D

Computer Science & Information Technology

You might also like to view...

When filtering data, you might want to apply a filter that is a(n) ________ in which you write the filter criterion yourself

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following is a variant of HTML?

A. DML B. BHTML C. XHTML D. TML

Computer Science & Information Technology

The System Stability Index displays a number from 1 to 10 each day that relates to the number of errors that occurred up to that day

Indicate whether the statement is true or false

Computer Science & Information Technology

To select text with the mouse, position the I-beam pointer to the left of the first character of the text you want to select. Hold down the left button on the mouse, drag the pointer to the end of the text you want to select, and release the button. This is called ____.

A. dropping B. copying C. pasting D. dragging

Computer Science & Information Technology