Which of the following can be used to limit the chance of employees conducting computer-based espionage?

a. Limit the use of storage devices, such as CDs and USBs, and control access to these devices.
b. Encrypt hard drives.
c. Give employees only the minimum amount of access they need to perform their job.
d. All the above.


ANS: D

Computer Science & Information Technology

You might also like to view...

Fundamentally, all AJAX methods are simplified versions of the ___________ API method.

a. $.get() b. $.post() c. $.getJSON() d. $.ajax()

Computer Science & Information Technology

You can use the Macro Designer to edit existing macros

Indicate whether the statement is true or false

Computer Science & Information Technology

When you export a presentation to a Word outline, slide titles will be formatted with the ________ style

A) Bullet B) Title C) Heading 1 D) Paragraph

Computer Science & Information Technology

IT security management functions include:

A. determining organizational IT security objectives, strategies, and policies B. detecting and reacting to incidents C. specifying appropriate safeguards D. all of the above

Computer Science & Information Technology