Which of the following can be used to limit the chance of employees conducting computer-based espionage?

a. Limit the use of storage devices, such as CDs and USBs, and control access to these devices.
b. Encrypt hard drives.
c. Give employees only the minimum amount of access they need to perform their job.
d. All the above.

ANS: D

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. The selection of recommended controls is not guided by legal requirements. 2. The recommended controls need to be compatible with the organization’s systems and policies. 3. The implementation phase comprises not only the direct implementation of the controls, but also the associated training and general security awareness programs for the organization. 4. Appropriate security awareness training for all personnel in an organization, along with specific training relating to particular systems and controls, is an essential component in implementing controls. 5. The IT security management process ends with the implementation of controls and the training of personnel.

Computer Science & Information Technology

Write a function to convert Celsius to Fahrenheit.

What will be an ideal response?

Computer Science & Information Technology