Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Your college friend shares with you code for an e-mail agent that can auto-respond to specific users with pre-defined content. Is it appropriate for you to implement this agent in the Company for a specific business purpose?
Home
iSecurity
Your college friend shares with you code for an e-mail agent that can auto-respond to specific...
0
votes
asked
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
Your college friend shares with you code for an e-mail agent that can auto-respond to specific users with pre-defined content. Is it appropriate for you to implement this agent in the Company for a specific business purpose?
A. YES
B. NO
information-security
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Aug 18, 2023
by
sharadyadav1986
B. NO
Related questions
0
votes
Q: You receive an e-mail on your Company ID which has a personal business proposal not related to the Company. Is it appropriate to reply?
asked
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
Q: You are under pressure and a bit dejected when you receive an e-mail from a friend on your official mail ID. Your friend has asked you to forward the e-mail to at least ten people. If you do so, a miracle would take place in your life within the next 24 hours, or else a mishap would take place. What should you do in such a scenario?
asked
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
Q: You receive a call from your friend asking you to leave immediately as there is some unrest in a certain part of the city. Which of these is the most appropriate action for you to take?
asked
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
Q: Due care must be taken for virus check while opening encrypted attachments as compared to unencrypted attachments in e-mail. Is this statement True or False?
asked
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
Q: A top government official is coming to visit you in one of the Company offices. This person is a prospective client for the Company. Select the appropriate choices to handle the visitor access for such officials
asked
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
Q: You are working on a project at a client site. The client has provided you with an e-mail id on their domain, and you are not allowed to access the company e-mail id through the client network. What will you do to access e-mails received on our company ID? Select the appropriate choice.
asked
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
secuity
0
votes
Q: You just received an e-mail from your bank asking you to confirm your online activities by logging on to your account within a week. What is the best course of action to take?
asked
Aug 18, 2023
by
sharadyadav1986
information-security
0
votes
Q: One day when you log on to your e-mail, you find that there is an unsolicited e-mail having abusive and offensive content in your inbox. What should you do?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
Q: You are on leave when you receive an urgent call from your supervisor asking for your login credentials so that another team member can log in and complete the pending request. What should you do in such a situation?
asked
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
Q: You have been working from home on your laptop. What do you need to do when you connect to the Company network?
asked
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
...