In the past, a company has experienced several network breaches as a result of end-user actions. To help mitigate future breaches, which of the following documents should the security team ensure are up-to-date and enforced for all employees? (Select TWO)

A. Memorandum of understanding
B. Data classification document
C. Service level agreement
D. Interconnection security agreement
E. Consent to monitor
F. Acceptable use policy


Answer:
A. Memorandum of understanding
F. Acceptable use policy

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. By default, the word Open is displayed in an Open dialog box's title bar. 2. The Save File Dialog control displays Save As in the dialog window’s title bar. 3. When the user specifies a location and filename with the Save As dialog box, the file's path and filename are stored in the control's File Path property. 4. You can change the default text displayed in the Save As dialog box's title bar by changing the Save File Dialog control's Display Text property. 5. The Next method in the Random class generates a floating-point number.

Computer Science & Information Technology

A(n) ________ is a visual display of tabulated frequencies

Fill in the blank(s) with correct word

Computer Science & Information Technology

In the Goal Seek dialog box, the ________ box contains a formula

Fill in the blank(s) with correct word

Computer Science & Information Technology

________ is the language used to markup text files so they can be viewed in a web browser

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology