• 2022-06-07
    Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()
    A: The cell phone should require a password after a set period of inactivity.
    B: The cell phone should only be used for company related emails.
    C: The cell phone data should be encrypted according to NIST standards.
    D: The cell phone should have data connection abilities disabled.
  • A

    内容

    • 0

      中国大学MOOC: A salesman should not touch the cell phone during the meeting with his customer.

    • 1

      A: __________ cell phone is this?B: It's George's.A: George's cell phone is red. This is orange.B: Are you sure?A: Yes, I am. This cell phone isn't ________.

    • 2

      I should always turn off (or silence) my cell phone before heading into any interview.

    • 3

      According to the second paragraph, when did cell phones actually help to reduce pedestrian and traffic fatalities A: Right after cell phones were invented. B: Before the number of cell phone users reached a critical mass C: When cell phone users totaled to a certain number. D: When the number of cell phones decreased to a certain number.

    • 4

      My cell phone is ________.