You see your coworker take software out of the locked cabinet and put it in his laptop bag and take it home. You suspect that he is installing it on an unauthorized computer because there are no external service calls for that technician in the morning. What should you do?
A) Nothing.
B) Mention it to your supervisor.
C) Confront your coworker and ask him for the software.
D) Wait until you calm down, talk to the coworker the next business day, and explain your concern.
B
You might also like to view...
What security related area of the FIPS 200 addresses the need to monitor, control, and protect communications at the organization's external boundaries and key internal boundaries?
Fill in the blank(s) with the appropriate word(s).
When you insert a hyperlink, Outlook does not require the ____________________ portion of the address.
Fill in the blank(s) with the appropriate word(s).
What is the purpose of the policy exceptions section?
A. To define sanctions for violations B. To convey intent C. To define exclusions D. To specify mandatory directives
If you set a database _____ all users must enter that combination of characters before they are allowed to open the database.
Fill in the blank(s) with the appropriate word(s).