Which of the following are valid uses for keystroke monitoring? (Choose all that apply.)
a. Surveillance of a user suspected of inappropriate activity
b. Testing and quality assurance
c. Information gathering
d. Routine activity monitoring
Answer:
a. Surveillance of a user suspected of inappropriate activity,
b. Testing and quality assurance,
c. Information gathering