Which of the following would be the MOST appropriate method for dealing with this issue going forward?

A manager who was attending an all-day training session was overdue entering bonus and payroll
information for subordinates. The manager felt the best way to get the changes entered while in
training was to log into the payroll system, and then activate desktop sharing with a trusted
subordinate. The manager granted the subordinate control of the desktop thereby giving the
subordinate full access to the payroll system. The subordinate did not have authorization to be in
the payroll system. Another employee reported the incident to the security team. Which of the
following would be the MOST appropriate method for dealing with this issue going forward?

A manager who was attending an all-day training session was overdue entering bonus and payroll
information for subordinates. The manager felt the best way to get the changes entered while in
training was to log into the payroll system, and then activate desktop sharing with a trusted
subordinate. The manager granted the subordinate control of the desktop thereby giving the
subordinate full access to the payroll system. The subordinate did not have authorization to be in
the payroll system. Another employee reported the incident to the security team. Which of the
following would be the MOST appropriate method for dealing with this issue going forward?

A.
Provide targeted security awareness training and impose termination for repeat violators.

B.
Block desktop sharing and web conferencing applications and enable use only with approval.

C.
Actively monitor the data traffic for each employee using desktop sharing or web conferencing
applications.

D.
Permanently block desktop sharing and web conferencing applications and do not allow its use
at the company.



Leave a Reply 0

Your email address will not be published. Required fields are marked *