Your company is merging with another company that operates in several other countries. Which of the following security issues is MOST likely to be effected by the differences in legal or regulatory requirements?

A. software coding practices
B. expectation of privacy policy
C. network access controls
D. disaster recovery procedures


B
Explanation: Legal or regulatory requirements in various countries may restrict the type of employee monitoring that can be done in that country.

Computer Science & Information Technology

You might also like to view...

If a disk has a status of ______________ Access, read/write access to that volume is being handled by another host computer in the cluster.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A popular video container that is the standard format for videos distributed on commercial DVDs is ____.

A. MOV B. FLV C. VOB D. ASF

Computer Science & Information Technology

Which command compiles the Java source code file Welcome.java?

a. cd Welcome.java b. javac Welcome.java c. java Welcome.java d. compile Welcome.java

Computer Science & Information Technology

Under User Account Control (UAC), which of the following tasks can be performed without supplying administrative credentials?

a. Installing critical updates from Windows Update. b. Installing an application. c. Configuring system settings. d. None of the above.

Computer Science & Information Technology