Which of the following can be used to limit the chance of employees conducting computer-based espionage?
a. Limit the use of storage devices, such as CDs and USBs, and control access to these devices.
b. Encrypt hard drives.
c. Give employees only the minimum amount of access they need to perform their job.
d. All the above.
ANS: D
You might also like to view...
Fundamentally, all AJAX methods are simplified versions of the ___________ API method.
a. $.get() b. $.post() c. $.getJSON() d. $.ajax()
You can use the Macro Designer to edit existing macros
Indicate whether the statement is true or false
When you export a presentation to a Word outline, slide titles will be formatted with the ________ style
A) Bullet B) Title C) Heading 1 D) Paragraph
IT security management functions include:
A. determining organizational IT security objectives, strategies, and policies B. detecting and reacting to incidents C. specifying appropriate safeguards D. all of the above