Which of the following should Sara, a security technician, create to articulate the requirements for what is and what is not condoned on company systems?

A. Acceptable usage policy
B. Retention policy
C. Privacy policy
D. Access control policy


Answer: A. Acceptable usage policy

Computer Science & Information Technology

You might also like to view...

What is the value of result after the following Java statements execute (assume all variables are of type int)?

a = 4; b = 12; c = 37; d = 51; result = d % a * c + a % b + a; a. 119 b. 51 c. 127 d. 59

Computer Science & Information Technology

If the file ____________________ is renamed, Windows might not be able to open it.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The primary benefit of offshoring and outsourcing is cost savings

Indicate whether the statement is true or false

Computer Science & Information Technology

Public-key cryptography is symmetric in that ________.

a) it decrypts messages using the same key it uses to encrypt b) both the sender and the receiver use the same key c) it employs two inversely related keys d) either host can create a key and both hosts can use it

Computer Science & Information Technology