Which of the following describes exactly what a user can and cannot do with the organization's computers and network?
A. acceptable use policy
B. security policy
C. configuration policy
D. baseline
Answer: A
Computer Science & Information Technology
You might also like to view...
A group of data items that are connected using pointers is called a(n) ____________.
What will be an ideal response?
Computer Science & Information Technology
Open the Clipboard task pane by clicking the ________ icon located on the Home tab in the lower right corner of the Clipboard group
Fill in the blank(s) with correct word
Computer Science & Information Technology
The horizontal placement of text within a placeholder.
A. Aspect ratio B. Text alignment C. Variant
Computer Science & Information Technology
What are the evaluation levels defined by the TCSEC?
What will be an ideal response?
Computer Science & Information Technology