Which of the following scenarios describes an IT
professional using good methods to protect
passwords and system access of users? Check all
of the boxes that apply.
When setting up the e-mail program for each
employee's computer, the IT professional has
the employee enter his or her e-mail
password to protect privacy.
The IT professional posts a list of employee
usernames and passwords on the wall.
The IT professional views an employee's
browsing history while the employee is on a
fifteen-minute break.


the answer is A


Which Of The Following Scenarios Describes An IT Professional Using Good Methods To Protect Passwords And System Access Of Users Check All Of The Boxes That App class=