Which of the following could Jane, a security administrator, implement to mitigate the risk of tailgating for a large organization?

A. Train employees on correct data disposal techniques and enforce policies.
B. Only allow employees to enter or leave through one door at specified times of the day.
C. Only allow employees to go on break one at a time and post security guards 24/7 at each entrance.
D. Train employees on risks associated with social engineering attacks and enforce policies.


Answer: D. Train employees on risks associated with social engineering attacks and enforce policies.

Computer Science & Information Technology

You might also like to view...

In the following line: hr {color: #00448877}, what is the property?

What will be an ideal response?

Computer Science & Information Technology

Array-based implementations of sets and dictionaries do not perform well.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

You can divide slides into sections to help organize the slides.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When you apply symbolism tools to mixed symbol instance sets, the only symbol instances that will be modified are those that are linked to the selected symbols in the Symbols panel.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology