Which of the following requires that users remove sensitive and confidential materials from workspaces and items that are not in use are locked when employees leave their workstation?

a. Data handling policy
b. Tailgating training
c. Clean desk policy
d. Phishing attack training


Answer: c. Clean desk policy

Computer Science & Information Technology

You might also like to view...

To find a contribution amount of $300 or greater, the entry in the Amount field's criteria should be:

A) >=300. B) >300. C) 300. D) >=$300.

Computer Science & Information Technology

What two properties should you specify for the RequiredFieldValidator?

What will be an ideal response?

Computer Science & Information Technology

?_____ determines whether a project can be completed in a reasonable amount of time.

a. ?Technical feasibility b. ?Schedule feasibility c. ?Operational feasibility d. ?Economic feasibility

Computer Science & Information Technology

XBRL

A. is the basic protocol that permits communication between Internet sites. B. controls Web browsers that access the Web. C. is the document format used to produce Web pages. D. was designed to provide the financial community with a standardized method for preparing E. is a low-level encryption scheme used to secure transmissions in higher-level (HTTP) format.

Computer Science & Information Technology