Matt, a new employee, installed an application on his workstation that allowed Internet users to have access to his workstation. Which of the following security related training could have mitigated this action?

A. Use of proper password procedures
B. Use of personally owned devices
C. Use of social networking and P2P networks
D. Use of clean desk policies

Answer: C. Use of social networking and P2P networks

Computer Science & Information Technology

You might also like to view...

A ________ is a predefined set of colors, fonts, lines, and special effects that look good together and can be applied to a workbook

A) template B) style C) form D) theme

Computer Science & Information Technology

A network technician has been asked to make the connections necessary to add video transported via fiber optics to the LAN within a building. Which of the following is the MOST common connector that will be used on the switch to connect the media converter?

A. FDDI B. Fiber coupler C. MT-RJ D. ST

Computer Science & Information Technology