Podcast
Questions and Answers
What is the scope of this policy?
What is the scope of this policy?
Who is responsible for protecting the laptop or desktop being used by the user?
Who is responsible for protecting the laptop or desktop being used by the user?
What is the purpose of the Asset Number/Serial Number label on the laptops and desktops?
What is the purpose of the Asset Number/Serial Number label on the laptops and desktops?
What is the purpose of installing only minimal required software on laptops and desktops?
What is the purpose of installing only minimal required software on laptops and desktops?
Signup and view all the answers
What should be done before installing any additional application software on laptops and desktops?
What should be done before installing any additional application software on laptops and desktops?
Signup and view all the answers
What is the purpose of using power on passwords on desktops?
What is the purpose of using power on passwords on desktops?
Signup and view all the answers
What action may be taken by NetConnect for failure to comply with the laptop and Desktop Security Policy?
What action may be taken by NetConnect for failure to comply with the laptop and Desktop Security Policy?
Signup and view all the answers
What is the process for returning a laptop when an employee leaves the organization or gets transferred?
What is the process for returning a laptop when an employee leaves the organization or gets transferred?
Signup and view all the answers
What precautions should be taken by users when carrying laptops in crowded areas?
What precautions should be taken by users when carrying laptops in crowded areas?
Signup and view all the answers
Who is responsible for maintaining the hardware and software of laptops and desktops?
Who is responsible for maintaining the hardware and software of laptops and desktops?
Signup and view all the answers
Where should users keep the make, model, and serial number of their laptop?
Where should users keep the make, model, and serial number of their laptop?
Signup and view all the answers
What should be done if a user's laptop is stolen?
What should be done if a user's laptop is stolen?
Signup and view all the answers
What is the process for initiating a change request for the application development team at NetConnect?
What is the process for initiating a change request for the application development team at NetConnect?
Signup and view all the answers
Who is responsible for raising change requests for network, operating system, and security configuration changes at NetConnect?
Who is responsible for raising change requests for network, operating system, and security configuration changes at NetConnect?
Signup and view all the answers
Which of the following is included in a change request for the application development team at NetConnect?
Which of the following is included in a change request for the application development team at NetConnect?
Signup and view all the answers
Who is responsible for raising change requests for specific requirements related to projects or functions and the applications used by the end users at NetConnect?
Who is responsible for raising change requests for specific requirements related to projects or functions and the applications used by the end users at NetConnect?
Signup and view all the answers
What is the role of the CISO in the change request process at NetConnect?
What is the role of the CISO in the change request process at NetConnect?
Signup and view all the answers