Which of the following activities is the most effective at keeping the actions of nae end users from putting the company’s physical and logical resources at risk?
A.
Configuring network intrusion-detection software to monitor end user activity
B.
Conducting a training session at the time of hire
C.
Reconfiguring the network firewall
D.
Assembling a team of security professionals to monitor the network