Which of the following should NOT be a part of an organization's policy regarding email attachments?

a. It was an expected attachment.
b. It came from a known source, and the source is confirmed.
c. It appears to be a legitimate business document.
d. None of the above


Answer D. These are all acceptable criteria for an email policy.

Computer Science & Information Technology

You might also like to view...

The method distance vector protocols use to prevent packets from endlessly circulating around a routing loop is called ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Before you freeze panes make sure the active cell is one row above and one column to the left of the rows and columns you want to freeze

Indicate whether the statement is true or false

Computer Science & Information Technology

Evaluate this postfix expression 3 16 6 - * 5 /

What will be an ideal response?

Computer Science & Information Technology

The reference marker of _____ is a lowercase Roman numeral unless you change it.?

A. endnotes? B. ?margins C. ?page breaks D. ?bookmarks

Computer Science & Information Technology