Which of the following is the BEST method to deter employees from the improper use of the company’s information systems?
Which of the following assessments would Pete, the security administrator, use to actively test that an application’s security controls are in place?