Sara, a company’s security officer, often receives reports of unauthorized personnel having
access codes to the cipher locks of secure areas in the building. Sara should immediately
implement which of the following?
A.
Acceptable Use Policy
B.
Physical security controls
C.
Technical controls
D.
Security awareness training