Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()
A: The cell phone should require a password after a set period of inactivity.
B: The cell phone should only be used for company related emails.
C: The cell phone data should be encrypted according to NIST standards.
D: The cell phone should have data connection abilities disabled.
A: The cell phone should require a password after a set period of inactivity.
B: The cell phone should only be used for company related emails.
C: The cell phone data should be encrypted according to NIST standards.
D: The cell phone should have data connection abilities disabled.
举一反三
- You have a meeting with a client but are expecting a call. You should: A: make sure your cell phone is charged up and turned on B: set your cell phone ring volume to high to ensure you hear any calls C: turn your cell phone off D: tell your client you are expecting a phone call
- You have a meeting with a client but are expecting a call. You<br/>should ________. A: set your cell phone ring volume to high to ensure you hear any call. B: turn your cell phone off. C: tell your client you are expecting a phone call.
- Also, you should take your cell phone with you. What’s (3)
- 9) Is this your cell phone number? A: Is B: this C: cell phone D: number
- What is said about cell phone use in paragraph 4 A: .The number of cell phones in use exploded in the late 1980s and part of the 1990s. B: The number of traffic deaths was reduced in the late 1980s and part of the 1990s due to cell phone use. C: Cell phone users are likely to be involved in traffic accidents. D: The use of cell phones has a life-saving effect for pedestrians and drivers.