Select all of the following statements regarding security policy that are true.

a. Your company should have a written security policy, and all employees should have access to the policy, even if they're casual workers.
b. Your small, home-based business probably is not at risk from hackers.
c. Access to sensitive data should be limited to only to employees who have worked for the company for more than six months.
d. Training on computer security should be provided for all staff members.


Answer:
a. Your company should have a written security policy, and all employees should have access to the policy, even if they're casual workers.
d. Training on computer security should be provided for all staff members.

Computer Science & Information Technology

You might also like to view...

An Access ________ allows you to retrieve information from tables and enable you to sort, search, and limit the data to just those records that you want to see

Fill in the blank(s) with correct word

Computer Science & Information Technology

A computer application designed to build and manipulate spreadsheets is called a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which hard drive type would load Windows 8 the fastest?

A) SAS B) SSD C) eSATA D) SATA E) PATA

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. The principle of locality reflects the observation that memory references by the processor tend to cluster for instructions but not for data. 2. One of the assertions that locality is based on is that during any interval of time, a program references memory locations non-uniformly. 3. Locality is based on the assertion that the correlation between immediate past and immediate future memory reference patterns is low, and increases as the time interval increases. 4. Intuitively, the principle of locality makes sense.

Computer Science & Information Technology