From a security point of view, which of the following actions should be done upon the termination of an employee?
A. remove the person's name from all lists of authorized access
B. recover all assets, including employee ID, disks, documents and equipment
C. remove all personal access codes
D. all of the above
D
You might also like to view...
Which of the following is true about international accounting standards?
a. Significant differences exist between U.S. GAAP and GAAP of other countries. b. Few differences exist between U.S. GAAP and GAAP of other countries. c. The IASB is the standards-setting body of France. d. It is unlikely that the differences between U.S. GAAP and GAAP of other countries will diminish over time.
Which of the following is true of the facilitating function performed by intermediaries?
a. It involves explaining a product's features, advantages, and benefits. b. It includes transportation and storage of assets. c. It includes research and financing. d. It involves communicating with prospective buyers to make them aware of existing products.
The Children's Online Privacy Protection Act prohibits Internet operators from collecting information from children under what age without parental permission?
a. 18 b. 16 c. 13 d. 10
A stock has a beta value of 1.5. If the risk-free rate is 3% and the market risk premium is 8%, the stock's required return is 15%
Indicate whether the statement is true or false