Which of the following steps should be taken by companies to protect against cyber terrorist and computer espionage attacks?

a. Ensure systems are as secured as possible.
b. Conduct background checks on all network administrators and security professionals.
c. Report any intrusions to law enforcement.
d. All the above.

ANS: D

Computer Science & Information Technology

You might also like to view...

In a shared workbook, information that is maintained about changes made in past editing sessions is called the ________

A) change history B) save history C) review history D) track history

Computer Science & Information Technology

When a structure contains another structure variable as one of its members, it is known as a ___________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology