From a security point of view, which of the following actions should be done upon the termination of an employee?
A. remove the person’s name from all lists of authorized access
B. recover all assets, including employee ID, disks, documents and equipment
C. remove all personal access codes
D. all of the above
D. all of the above
Computer Science & Information Technology
You might also like to view...
Press the ________ Indent button on the HOME tab to move a bulleted line to the right
Fill in the blank(s) with correct word
Computer Science & Information Technology
A security association is uniquely identified by three parameters: security parameter index, protocol identifier, and ________________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology