How to deal with a virus attack would be detailed under which of the following?

A. acceptable user policy
B. security policy
C. configuration policy
D. baseline


Answer: B

Computer Science & Information Technology

You might also like to view...

A core _____ is the widely accepted principle that guides how employees behave and make decisions in the organization?.

A. ?strategy B. ?value C. objective D. ?goal

Computer Science & Information Technology

Controls can improve form usability and design

Indicate whether the statement is true or false

Computer Science & Information Technology

You can add Visual Basic for Applications (VBA) code to a form in ________ view

A) Print Preview B) Design View C) Layout View D) Report View

Computer Science & Information Technology

__________ are the technically qualified individuals tasked to configure firewalls, deploy IDSs, implement security software, diagnose and troubleshoot problems, and coordinate with systems and network administrators to ensure that an organization's security technology is properly implemented.

A. CSOs B. CISOs C. Security managers D. Security technicians

Computer Science & Information Technology