What is an effective countermeasure for the vulnerability of data entry operators potentially leaving their computers without logging off?
A. Employee security awareness training
B. Administrator alerts
C. Screensaver passwords
D. Close supervision
A. Employee security awareness training
B. Administrator alerts
C. Screensaver passwords
D. Close supervision