Which of the following requires that users remove sensitive and confidential materials from workspaces and items that are not in use are locked when employees leave their workstation?

a. Data handling policy
b. Tailgating training
c. Clean desk policy
d. Phishing attack training

Answer: c. Clean desk policy

Computer Science & Information Technology

You might also like to view...

Why is it important to provide a specific statement of responsibility?

What will be an ideal response?

Computer Science & Information Technology

If you enter three values for border width, the values are applied in the order of ____.

A. top, left/right, and bottom borders B. left/right, top and bottom borders C. top and bottom borders, left/right D. bottom and top borders, left/right

Computer Science & Information Technology