Which of the following requires that users remove sensitive and confidential materials from workspaces and items that are not in use are locked when employees leave their workstation?
a. Data handling policy
b. Tailgating training
c. Clean desk policy
d. Phishing attack training
Answer: c. Clean desk policy
You might also like to view...
To find a contribution amount of $300 or greater, the entry in the Amount field's criteria should be:
A) >=300. B) >300. C) 300. D) >=$300.
What two properties should you specify for the RequiredFieldValidator?
What will be an ideal response?
?_____ determines whether a project can be completed in a reasonable amount of time.
a. ?Technical feasibility b. ?Schedule feasibility c. ?Operational feasibility d. ?Economic feasibility
XBRL
A. is the basic protocol that permits communication between Internet sites. B. controls Web browsers that access the Web. C. is the document format used to produce Web pages. D. was designed to provide the financial community with a standardized method for preparing E. is a low-level encryption scheme used to secure transmissions in higher-level (HTTP) format.