Which of the following should Sara, a security technician, create to articulate the requirements for what is and what is not condoned on company systems?
A. Acceptable usage policy
B. Retention policy
C. Privacy policy
D. Access control policy
Answer: A. Acceptable usage policy
You might also like to view...
What is the value of result after the following Java statements execute (assume all variables are of type int)?
a = 4; b = 12; c = 37; d = 51; result = d % a * c + a % b + a; a. 119 b. 51 c. 127 d. 59
If the file ____________________ is renamed, Windows might not be able to open it.
Fill in the blank(s) with the appropriate word(s).
The primary benefit of offshoring and outsourcing is cost savings
Indicate whether the statement is true or false
Public-key cryptography is symmetric in that ________.
a) it decrypts messages using the same key it uses to encrypt b) both the sender and the receiver use the same key c) it employs two inversely related keys d) either host can create a key and both hosts can use it