Which of the following can be used to limit the chance of employees conducting computer-based espionage?

A) Limit the use of storage devices, such as CDs and USBs, and control access to these devices.
B) Shred documents and destroy old disks, tape backups, and CDs.
C) Give employees only the minimum amount of access they need to perform their job.
D) All of the above

D) All of the above

Computer Science & Information Technology

You might also like to view...

In Visual C++ 2005 Express, a double variable requires 8 bytes of storage space and an integer requires 4 bytes of storage space. How many bytes of memory are required for a double pointer? For an integer pointer?

What will be an ideal response?

Computer Science & Information Technology

_________ workers are not official employees of a company.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology