Matt, a new employee, installed an application on his workstation that allowed Internet users to have access to his workstation. Which of the following security related training could have mitigated this action?
A. Use of proper password procedures
B. Use of personally owned devices
C. Use of social networking and P2P networks
D. Use of clean desk policies
Answer: C. Use of social networking and P2P networks
You might also like to view...
The PA12 Ensure Quality process exists under what high-level practice area?
A. Security Base Practices B. Project and Organizational Base Practices C. Security Controlled Engineering Practices D. Project and Security Base Practices
What property causes a control to disappear when set to False?
(A) Detectible (B) Visible (C) Disabled (D) Supported
Under Windows XP, rather than incorporating the API’s routines and protocols into each application program, key functions and data are stored on the __________.
a. integral subsystem b. environment subsystem c. file system d. dynamic link library (DLL)
As shown in the accompanying figure, a typical ____ displays the name or a description of the command.
A. tab B. tool C. ScreenTip D. menu