What policy is designed to ensure that all confidential or sensitive materials, either in paper form or electronic, are removed from a user's workspace and secured when the items not in use or when employees leave their workspace?
A. clean workspace
B. secure workspace
C. clean desk
D. secure desk
Answer: C
You might also like to view...
A direct access file is also known as a(n) __________access file.
Fill in the blank(s) with the appropriate word(s).
Consider the algorithm for consensus in a synchronous system, which uses the following integrity definition: if all processes, whether correct or not, proposed the same value, then any correct process in the decided state would chose that value. Now consider an application in which correct processes may propose different results, e.g., by running different algorithms to decide which action to take in a control system’s operation. Suggest an appropriate modification to the integrity definition and thus to the algorithm.
What will be an ideal response?