Ann, a company’s security officer, often receives reports of unauthorized personnel having access
codes to the cipher locks of secure areas in the building. Ann should immediately implement which
of the following?
A.
Acceptable Use Policy
B.
Physical security controls
C.
Technical controls
D.
Security awareness training