• Question 42 Which employee role is directly accountable to ensure that employees are implementing security policies consistently ?
• Question 43 Your company wants to minimize the risk of its employees sharing confidential company information via e- mail . What is the best tool to use to minimize this risk ?
• Question 44 An employee used her company-owned computer to e-mail invitations to friends for her upcoming party , which violated the company ' s acceptable use policy . Who is responsible for correcting the employee ' s behavior ?
• Question 45 What is a disadvantage of hard-coding a user name and password into an application to simplify guest access ?