Which of the following are likely to be considered incidents requiring an appropriate official response and documentation?

a. Use of social networking sites contrary to published policy.
b. Unauthorized printing of personal documents on company time and equipment.
c. The door to server room was left unlocked.
d. Someone forgot to clock out at the end of his work day.
e. An unauthorized guest logged into the wireless system from the parking lot.


A, B, E. A, B, and E all reference an unauthorized activity that has the potential to create unnecessary expense to the company or expose the company to threats to it data systems. C and D were not defined in the answers as being an unauthorized activity. Naturally incidents involving injury need a response and documentation whether unauthorized activities were involved.

Computer Science & Information Technology

You might also like to view...

The ________ theme color will be selected when the Civic theme is applied to a presentation

Fill in the blank(s) with correct word

Computer Science & Information Technology

A(n) ________ bar is a horizontal gradient or solid fill indicating the cell's relative value compared to other selected cells

Fill in the blank(s) with correct word

Computer Science & Information Technology

When searching for templates in Backstage view, you will see ________, or small pictures, of the choices available to you

Fill in the blank(s) with correct word

Computer Science & Information Technology

?The ____ model is the process or processes that a company uses to find new customers, make sales, and deliver the goods or services it sells.

A. ?subscription B. ?mixed advertising-subscription C. ?advertising D. ?revenue

Computer Science & Information Technology