Sara, a company's security officer, often receives reports of unauthorized personnel having access codes to the cipher locks of secure areas in the building Sara should immediately implement which of the following?
A. Acceptable Use Policy
B. Physical security controls
C. Technical controls
D. Security awareness training
Answer: D. Security awareness training
Computer Science & Information Technology
You might also like to view...
________ can be created by putting a pound sign (#) in front of a key phrase
A) Retweets B) Twitterers C) Hashtags D) Tweeters
Computer Science & Information Technology
When should designers employ abductive reasoning?
What will be an ideal response?
Computer Science & Information Technology
The default backup configuration is to always perform incremental backups.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
The memory-management process that removes unused files on a solid state drive to make memory available is ________
a. Forensic cleaning b. Defragmentation c. Disk cleanup d. None of the above
Computer Science & Information Technology