subject

%) Provided that your organization has an Email and Internet use policy covering "Code of Conduct" on using computer assets during working hours. What should you do in the following situations if you are an IT security professional in the company: a. Your colleague Linda received several emails from another colleague Greg. In the emails, Greg used strong language to abuse and criticize her work. Those emails were broadcasted to the whole team and the managers, but no one respond to it. b. Your colleague Jack maintain his private blog online. Occasionally, he will post comments on his work and the company. You find that his blog has a link to a website "YourCompanySucks." He explained to you that he maintains his blog during non-working hours, and he is not the owner or author of that website.

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 15:00
This is not a factor that you should use to determine the content of your presentation. your audience your goals your purpose your technology
Answers: 1
question
Computers and Technology, 24.06.2019 06:30
For which utilities, if any, does the landlord pay?
Answers: 2
question
Computers and Technology, 24.06.2019 13:00
Why should you evaluate trends when thinking about a career path?
Answers: 1
question
Computers and Technology, 24.06.2019 17:00
What are some examples of what can be changed through options available in the font dialog box? check all that apply. font family italicizing bolding pasting drop shadow cutting character spacing special symbols
Answers: 2
You know the right answer?
%) Provided that your organization has an Email and Internet use policy covering "Code of Conduct" o...
Questions
question
Mathematics, 06.05.2020 08:10