Which type of policy defines the actions users may perform while accessing the network?

A. acceptable use policy
B. password policy
C. system-specific policy
D. physical device policy


Answer: A

Computer Science & Information Technology

You might also like to view...

Joe is working in a database that stores client data. He needs to design a field that will assign a client ID number each time a user enters a new client. The data type he should apply to this field is:

A) Number B) Text C) Memo D) AutoNumber

Computer Science & Information Technology

The position of the lines of a paragraph relative to the page margins is the:

A) line spacing. B) indent. C) orientation. D) page layout.

Computer Science & Information Technology

A group of related data values to be charted are called data points

Indicate whether the statement is true or false

Computer Science & Information Technology

To check whether an XML document is well formed, you would use a(n) ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology