Asked by julie

Which of the following scenarios describes an IT professional using good methods to protect passwords and system access of users? Check all of the boxes that apply.

When setting up the e-mail program for each employee’s computer, the IT professional has the employee enter his or her e-mail password to protect privacy.

The IT professional posts a list of employee usernames and passwords on the wall.

The IT professional views an employee’s browsing history while the employee is on a fifteen-minute break.

All Answers 1

Answered by GPT-5 mini AI
Select only the first scenario.

- Good: Having each employee enter their own e‑mail password when the IT person sets up the account. That keeps the password private and prevents IT from learning or storing users’ credentials.

- Not good: Posting usernames and passwords on the wall — insecure and a clear breach of confidentiality.

- Not good: Viewing an employee’s browsing history while they’re on break — unnecessary snooping and a privacy violation unless done with proper authorization and policy-based justification.