93%(480)447 out of 480 people found this document helpful
This preview shows page 327 - 329 out of 428 pages.
41) For which of the following reasons do employers adopt surveillance technologies to track online communications? 42) ________ are used to monitor e-mail, web surfing, and other online communications in organizations.43) Which of the following is a negative impact of surveillance in online communications?
44) What is the first step involved in risk management?45) Lora Jones is a security expert hired by a Manhattan-based law firm to perform a formal risk assessment of the firm's data assets. Which of the following steps should she undertake first in order to assess the firm's readiness to face any potential security breaches?46) Which of the following statements is true of honeypots?