• Question 39 Your company does not want its employees to use the Internet to exchange personal e-mail during work hours . What is the best tool to use to ensure the company does not violate an employee ' s right to privacy ?
• Question 40 Which of the following is least likely to indicate the effectiveness of an organization ' s security policies ?
• Question 41 What is the name of a common control that is used across a significant population of systems , applications , and operations ?