List three types of security policy.

What will be an ideal response?


Acceptable use policy
Password policy
Wireless policy

Computer Science & Information Technology

You might also like to view...

If a user enters a value in the text box of an editable combo box and the value is NOT in the list, what will the method getSelectedItem return?

A) The value that the user replaced B) The index of the item the user entered C) The value that appears in the text field, even if it is not in the combo box's list D) Nothing, since the item is not in the list

Computer Science & Information Technology

In Windows 8.1, the easiest way to open an app is to use the ________ feature

A) Open B) Search C) Launch D) Apps

Computer Science & Information Technology

Margin collapse occurs only when two horizontal margins come in contact.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When a 32-bit CPU is used, what is the maximum amount of RAM that Windows can use?

a. 640KB b. 3.25GB c. 1TB d. 8GB

Computer Science & Information Technology