You are hired by a small business to recommend which security policies and procedures would be most helpful to the business. The business is comprised of 15 employees, operating off of two shared servers. One server houses employee data, and the other houses client data. All machines are on the same local network. Often these employees must work remotely from client sites, but do not remotely

access either of the servers. Assuming no security policies or procedures are in place right now, which two policies are most applicable for implementation?

A. password policies and data classification policies
B. wireless access policies and virtual private network policies
C. wireless access policies and password policies
D. virtual private network policies and data classification policies


A
Explanation: Password policies and data classification policies are most applicable for this implementation. Password policies ensure that users authenticate using a username/password combination. Data classification policies categorize data to ensure that users only access data they should.
Wireless access policies and virtual private network policies are not as important as password policies and data classification policies. Wireless access policies control who accesses the wireless network. Virtual private network (VPN) policies control who accesses the VPN.

Computer Science & Information Technology

You might also like to view...

The ____________________ Wizard allows Field Names to be added to text files imported into an Access database if the first row of the imported data does not contain field names.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A ________ is an agreement whereby one party (the trustee) agrees to hold ownership of a piece of property for the benefit of another party (the beneficiary).

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What technique is used by computers to determine the network ID of an IP address?

A. supernetting B. classful addressing C. subnetting D. logical AND operation

Computer Science & Information Technology

In an optical disc, the absence of light is read as binary digit 1.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology