Sara, a company's security officer, often receives reports of unauthorized personnel having access codes to the cipher locks of secure areas in the building Sara should immediately implement which of the following?

A. Acceptable Use Policy
B. Physical security controls
C. Technical controls
D. Security awareness training


Answer: D. Security awareness training

Computer Science & Information Technology

You might also like to view...

________ can be created by putting a pound sign (#) in front of a key phrase

A) Retweets B) Twitterers C) Hashtags D) Tweeters

Computer Science & Information Technology

When should designers employ abductive reasoning?

What will be an ideal response?

Computer Science & Information Technology

The default backup configuration is to always perform incremental backups.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The memory-management process that removes unused files on a solid state drive to make memory available is ________

a. Forensic cleaning b. Defragmentation c. Disk cleanup d. None of the above

Computer Science & Information Technology