I would politely tell the interviewer that I am not able to answer that question as it would be considered an invasion of personal privacy as per the Privacy Act of 1974, I would then point out that I do my best to always respect the privacy of others, and of course follow all laws and rules as set forth by my employer, and state and federal law. Emphasize to the interviewer, that I am a person who can be trusted.
Answer:
Answers explained below
Explanation:
1. Option b) Knowing your purpose gives you a clear direction on what to present and how to present. The purpose of clarity leads to quality content that connects with the audience.
2. Option a, b and d
-> We must know the general elements such as age, gender, and education. This generally determines the topic's appeal to the audience and you need to know ways of delivery that will connect with the audience.
-> Further, the idea is that the audience remembers the content and main catch points and not what we will get out of presentation.
Answer:
opportunity cost, the elderly woman is alsotaking a cost by not doing nothing as it renounce to doing the walks to obtain safety at home.
Under economics concepts everything has at least one opportunity cost associated with it.
Explanation:
The opportunity cost represent the best alternative we renounce for the given course of action or use of the resources.
In this case not going to walk has the cost walking.
Answer: Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data .This is the presentation of the summary of what the organization should do to prevent this from happening again.
Explanation:
The <u>objective of information security i</u>s to maintain a reasonably secure environment as well as the proper use of resources and risk management, in order to preserve the availability, integrity and confidentiality of information and the assurance of business continuity. Also :
- To manage information security risks to keep them at acceptable levels.
- Protect information assets.
- Train public servants, suppliers and stakeholders about the importance of data protection.
- Monitor compliance with information security requirements.
- Implement corrective and improvement actions.
Since the current trend is that <em>employees take their personal devices to the office,</em> in addition to giving them personal use, the most common is that they use it for the <em>review of corporate email and as support for the tasks of their daily work.</em> Therefore, proper management of the devices that are connected must be defined, in order to use the applications and information according to the provisions of the policies established by the company.
The most common threats are :
- Unofficial applications. (Can ask you for permitions and steal your private information)
- Public WIFI.(Can enter in to your network and steal your private information)
- Phising.(The most common is an email that force you to open a message which links to a malicious website to steal your personal information)
Always is important to protect the device with one or several of this advices:
- Secure access networks.
- Access to information must be restricted in a way that guarantees that only those people who are really qualified to do so can access the information.
- Write a security policy. Define which devices can access corporate information.
- Protect WiFi connections.
- Protect against malware.
In this scenario the <em>company should </em>make an update of all information and networks ,the installation and configuration of firewalls and encryption of corporate confidential information.
The best way is to train and make the employees of the company aware of the risk of sharing information and the legal punishment that they can have if they do it.
Every company must have a standardized risk plan to solve these types of situations before more information is leaked(can apply some of those mentioned above).
just you know what it must be that i think
Explanation:
suppose a perfectly competitive market is sufdenly what think so