1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liubo4ka [24]
4 years ago
14

%) Provided that your organization has an Email and Internet use policy covering "Code of Conduct" on using computer assets duri

ng working hours. What should you do in the following situations if you are an IT security professional in the company: a. Your colleague Linda received several emails from another colleague Greg. In the emails, Greg used strong language to abuse and criticize her work. Those emails were broadcasted to the whole team and the managers, but no one respond to it. b. Your colleague Jack maintain his private blog online. Occasionally, he will post comments on his work and the company. You find that his blog has a link to a website "YourCompanySucks." He explained to you that he maintains his blog during non-working hours, and he is not the owner or author of that website.
Computers and Technology
1 answer:
Ugo [173]4 years ago
8 0

Answer:

<u>a. Advice Greg and Linda</u>

<u>b. Nothing</u>

Explanation:

<em>Remember</em>, a code of conduct is usually a written set of instructions detailing the company's rules on general employee behaviour.

a. Although no one responded including the managers who are in the position to do so, it is ethical for me as the IT security professional to advice both Greg and Linda on obeying the company's rules.

b. Since Greg by his statemendoes not directly go against the code of conduct of not using computer assets during working hours, I don't need to do anything.

You might be interested in
I just want a refund please. Thank you
Nina [5.8K]
Unfortunately you can’t be refunded points. Sorry :(
7 0
3 years ago
What report would best help identify potential browser issues with website traffic?
Bezzdna [24]

The question above has multiple choices:

<span>a)      </span>The Active Users report

<span>b)      </span>The New vs Returning report

<span>c)       </span>The Browser & OS report

<span>d)      </span>The Source/Medium report

The answer is c) The browser & OS report


The browser & OS report in Google analytics can be used to analyze the website consumption in various versions of operating systems and web browsers. You are able to compare metrics such as bounce rate, session duration, and pages/sessions to each browser or OS.






6 0
3 years ago
Spyware is unwanted and often unsolicited messages. It is not technically malicious software, but can have a serious negative ef
o-na [289]

Answer:

The answer is "Option b".

Explanation:

The given statement is false because the spyware is a malicious program, that infects its device, and steals access to systems data from its web, and the spam also isn't technically malicious, but it could have a serious negative impact through density on the networks, and it is also junk message, which is web slang for an email message, which is primarily unsolicited email.

4 0
4 years ago
A knowledge and skills test is a tool support managers use when selecting new employees; it measures an applicant's understandin
OLEGan [10]

Answer:

Option (a)

Explanation:

It is true that managers takes some interviews and some tests which include questions which are able to identify the capabilities of the employee. Their field of expertise can be known by these tests which helps in which project they should put under where their skills will bloom and they can be more efficient. It helps manager to know if the employee is the best fit for their company or not.

6 0
3 years ago
What key should you press to display the spelling and grammar dialog box
GalinKa [24]
<h3>f7 should open the spelling and grammer dialog box</h3>
7 0
3 years ago
Read 2 more answers
Other questions:
  • The area that holds all the instructions the computer needs to start up when it is powered on is ________.
    11·1 answer
  • PLEASE HELP!<br> How do you "brainliest" an answer?
    13·2 answers
  • Suppose that your application uses a loop that isn't producing the intended results. The best way to analyze what’s going on in
    13·1 answer
  • What is not true about contracts?
    12·2 answers
  • Namecoin is an alternative blockchain technology that is used to implement decentralized version of Routing Banking System.A. Tr
    14·1 answer
  • When you are printing handouts, which of these can you do?
    6·1 answer
  • Hey yall wanna send me some just ask for my phone #
    13·1 answer
  • CLS <br> N = 1<br> FOR J = 1 TO 5 <br> PRINT N<br> N = 10*N+1 <br> NEXT J<br> END
    14·1 answer
  • PLEASE HELP ME I WILL GIVE BRAINIEST AND 40 POINTSPython Project Worksheet
    12·1 answer
  • Which of the following is NOT a type of insurance fraud?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!