Companies often have formal email policies that would include all of the following except what?
A) Using email services for personal messages
B) Sending confidential information
C) Sending objectionable material
D) Opening attachments
E) Who can be copied on emails
Answer: E
Explanation: E) Many companies now have formal email policies that specify how employees can use email, including restrictions against using company email service for personal messages, sending confidential information, or sending material that might be deemed objectionable. In addition, many employers now monitor email, either automatically with software programmed to look for sensitive content or manually via security staff actually reading selected email messages. Regardless of formal policies, though, every email user has a responsibility to avoid actions that could cause trouble, from opening virus-infected attachments to sending inappropriate photographs.
You might also like to view...
All of the following tests of controls will provide evidence that adequate computer virus control techniques are in place and functioning except
a. verifying that only authorized software is used on company computers b. reviewing system maintenance records c. confirming that antivirus software is in use d. examining the password policy including a review of the authority table
Forcing the user to use his or her own privileges for a program unit, and not that of the owner is called ____.
A. definer-rights B. user-rights C. user scope D. invoker-rights
Which of the following is NOT one of the questions we should ask in determining whether an activity should be accelerated?
a. What costs are associated with accelerating other project activities? b. What are the gains versus losses in accelerating the activity? c. How will the project manager benefit from crashing the project? d. Is the activity critical?
High-end tools are generally licensed on a(n) _____ basis.
Fill in the blank(s) with the appropriate word(s)