When an employee is terminated from employment, the employee’s access to computers should be terminated:
a. At the next monthly audit
b. At the next quarterly audit
c. Within seven days
d. Within one day
d. Within one day
You might also like to view...
Jacquard's loom, although unrelated to computing, influenced the development of modern computing devices. What design features of that machine are relevant to modern computer architectures?
What will be an ideal response?
When you ____________________ a paragraph, the last character of the text line is near the right border.
Fill in the blank(s) with the appropriate word(s).
A security audit has uncovered that some of the encryption keys used to secure your organization's business-to-business (B2B) private data exchange transactions with its partners are too weak. The security administrator needs to implement a process to ensure that private data exchange transactions will not be compromised if a weak encryption key is found. Which should the security administrator
implement? A. Implement PFS on all VPN tunnels B. Implement PFS on all SSH connections C. Implement HMAC on all VPN tunnels D. Implement HMAC on all SSH connections
________ performance applies mostly to plays, songs and movies
Fill in the blank(s) with correct word