Ask Question
6 October, 05:45

A. Requiring computer users to log off before leaving for lunch

B. Never sharing user or password information with anyone

C. Allow dumpster diving every Thursday

D. Changing passwords every 30-60 days

E. Require competitive click-fraud events

F. Encourage zombies to visit the system

+3
Answers (1)
  1. 6 October, 09:11
    0
    Option A, B, and D.

    Explanation:

    In the above question, the some details of the question are missing that is the part of the question.

    Information Security applies to the mechanisms and techniques built and maintained to secure print, computerized, or any other type of personal, secret and confidential information or records from unauthorized access, usage, exploitation, release, damage, manipulation, or disturbance.

    So, the following are the option that is true about the scenario.

    Other option is not true about the scenario because Option C the click fraud are not the part or protect from the information security and Option F is not considered to the following scenario.
Know the Answer?
Not Sure About the Answer?
Get an answer to your question ✅ “A. Requiring computer users to log off before leaving for lunch B. Never sharing user or password information with anyone C. Allow dumpster ...” in 📙 Computers & Technology if there is no answer or all answers are wrong, use a search bar and try to find the answer among similar questions.
Search for Other Answers