Which of the following describes exactly what a user can and cannot do with the organization's computers and network?

A. acceptable use policy
B. security policy
C. configuration policy
D. baseline


Answer: A

Computer Science & Information Technology

You might also like to view...

A group of data items that are connected using pointers is called a(n) ____________.

What will be an ideal response?

Computer Science & Information Technology

Open the Clipboard task pane by clicking the ________ icon located on the Home tab in the lower right corner of the Clipboard group

Fill in the blank(s) with correct word

Computer Science & Information Technology

The horizontal placement of text within a placeholder.

A. Aspect ratio B. Text alignment C. Variant

Computer Science & Information Technology

What are the evaluation levels defined by the TCSEC?

What will be an ideal response?

Computer Science & Information Technology