Multiple Choice
From a security point of view, which of the following actions should be done upon the termination of an employee?
A) remove the person's name from all lists of authorized access
B) recover all assets, including employee ID, disks, documents and equipment
C) remove all personal access codes
D) all of the above
Correct Answer:

Verified
Correct Answer:
Verified
Q2: _ is explicitly required for all employees.<br>A)
Q3: Many companies incorporate specific e-mail and Internet
Q4: Security awareness, training, and education programs can
Q5: A(n) _ is any file or object
Q6: Security awareness, training, and education programs may
Q7: Awareness only communicates information security policies andprocedures
Q8: The _ level focuses on developing the
Q9: Complying with regulations and contractual obligations is
Q10: Security education is most often taught by
Q11: _ can include computer viruses, Trojan horse