An organization is concerned that its employees will reveal its secrets to other parties. The organization should implement:
a. Document marking
b. Non-disclosure agreements
c. Logon banners
d. Security awareness training
b. Non-disclosure agreements
Computer Science & Information Technology
You might also like to view...
A lock object is created with class_________ .
a) threading.RLock. b) threading.newLock. c) threading.ThreadLock. d) None of the above.
Computer Science & Information Technology
A(n) ____________________ represents a picture or sketch of a screen the user will see when running a program.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Tables are a good source for data in a lookup field
Indicate whether the statement is true or false
Computer Science & Information Technology
When a computer contacts a WSUS server for the first time, what groups will the computer be added to by default?
What will be an ideal response?
Computer Science & Information Technology