COMPUTER NETWORKS AND COMMUNICATIONS
NETWORK SECURITY AND CYBERSECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
GDMS reserves the right to monitor, collect, audit, access and inspect any data within the network in the following circumstances (hint, check IT-POL-3). Check all that apply
|
To collect evidence pertaining to compliance issues or validation with GDMS policies
|
|
To detect malware on devices or moving through the network
|
|
To ensure GDMS sensitive data in not being exfiltrated
|
|
To collect metrics on employee productivity
|
Explanation:
There is 1 question to complete.