The method to provide end users of IT systems and applications with requirements related to acceptable use, privacy, new threats and trends, and use of social networking is:

The method to provide end users of IT systems and applications with requirements related to
acceptable use, privacy, new threats and trends, and use of social networking is:

The method to provide end users of IT systems and applications with requirements related to
acceptable use, privacy, new threats and trends, and use of social networking is:

A.
Security awareness training.

B.
BYOD security training.

C.
Role-based security training.

D.
Legal compliance training.



Leave a Reply 0

Your email address will not be published. Required fields are marked *