Which of the following is NOT among the common guidelines that should be reflected in the rule base to implement an organization's security policy?

A. only authenticated traffic can access the internal network
B. employees can use instant-messaging only with external network users
C. the public can access the company Web servers
D. employees can have restricted Internet access


Answer: B

Computer Science & Information Technology

You might also like to view...

If my program is calling a function that returns an integer value, what do I need to remember to have in the call statement so that I obtain and keep that integer value?

What will be an ideal response?

Computer Science & Information Technology

Words that are spelled correctly, but used incorrectly in Word are flagged with a dark red, bolded underline

Indicate whether the statement is true or false

Computer Science & Information Technology

When you move a formula, the cell references in the formula will change if they are relative references.

a. true b. false

Computer Science & Information Technology

To paste copied cell contents, you can press the _____ keys.

A. CTRL+C B. CTRL+P C. CTRL+V D. CTRL+X

Computer Science & Information Technology