Joshe is a project leader in Tiran technologies. 75 developers and analysts work under his supervision on several projects. These employees are scattered in small groups in the organization, depending on the project they are working on. Which collaboration tool would be most appropriate for Joshe to keep track whether his developers and analysts are out-of-office, busy, or available?
a. Desktop sharing
b. Presence information
c. Web conferencing
d. Instant messaging
b. Presence information
Presence information provides users with the ability to see a colleague’s availability status, whether the person is out-of-office, busy, or available. Knowing whether coworkers are available provides several time-saving benefits for an organization.
You might also like to view...
Worm and Distributed Denial of Service (DDoS) Agent Infestation
Study the following scenario and discuss and determine the incident response handling questions that should be asked at each stage of the incident response process. Consider the details of the organization and the CSIRC when formulating your questions. This scenario is about a small, family-owned investment firm. The organization has only one location and less than 100 employees. On a Tuesday morning, a new worm is released; it spreads itself through removable media, and it can copy itself to open Windows shares. When the worm infects a host, it installs a DDoS agent. It was several hours after the worm started to spread before antivirus signatures became available. The organization had already incurred widespread infections. The investment firm has hired a small team of security experts who often use the diamond model of security incident handling.
OneNote Online can collect all of the pieces of a larger project for review and discussion in a single file
Indicate whether the statement is true or false
Windows updates include security patches
Indicate whether the statement is true or false
Which of the following best describes accounting?
A. The logging of access and usage of information resources B. The configuring of the Security log to record events C. The process of tracing actions to their source D. The process of identifying users who seek access to secure information