An organization is concerned that its employees will reveal its secrets to other parties. The organization should implement:

a. Document marking
b. Non-disclosure agreements
c. Logon banners
d. Security awareness training


b. Non-disclosure agreements

Computer Science & Information Technology

You might also like to view...

A lock object is created with class_________ .

a) threading.RLock. b) threading.newLock. c) threading.ThreadLock. d) None of the above.

Computer Science & Information Technology

A(n) ____________________ represents a picture or sketch of a screen the user will see when running a program.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Tables are a good source for data in a lookup field

Indicate whether the statement is true or false

Computer Science & Information Technology

When a computer contacts a WSUS server for the first time, what groups will the computer be added to by default?

What will be an ideal response?

Computer Science & Information Technology