Matt, a new employee, installed an application on his workstation that allowed Internet users to have access to his workstation. Which of the following security related training could have mitigated this action?

A. Use of proper password procedures
B. Use of personally owned devices
C. Use of social networking and P2P networks
D. Use of clean desk policies


Answer: C. Use of social networking and P2P networks

Computer Science & Information Technology

You might also like to view...

The PA12 Ensure Quality process exists under what high-level practice area?

A. Security Base Practices B. Project and Organizational Base Practices C. Security Controlled Engineering Practices D. Project and Security Base Practices

Computer Science & Information Technology

What property causes a control to disappear when set to False?

(A) Detectible (B) Visible (C) Disabled (D) Supported

Computer Science & Information Technology

Under Windows XP, rather than incorporating the API’s routines and protocols into each application program, key functions and data are stored on the __________.

a. integral subsystem b. environment subsystem c. file system d. dynamic link library (DLL)

Computer Science & Information Technology

As shown in the accompanying figure, a typical ____ displays the name or a description of the command.

A. tab B. tool C. ScreenTip D. menu

Computer Science & Information Technology