A company has had several incidents involving users downloading unauthorized software, using unauthorized websites, and using personal USB devices. The CIO wants to put in place a scheme to manage the user threats. What three things might be put in place to manage the threats? (Choose three.)

  • Change to thin clients.
  • Disable CD and USB access.
  • Implement disciplinary action.
  • Monitor all activity by the users.
  • Provide security awareness training.
  • Use content filtering.

К сожалению, у нас пока нет статистики ответов на данный вопрос, но мы работаем над этим.