Which of the following are security relevant policies?

A. Information classification policy
B. Network access policy
C. Data security standard
D. Procurement policy
E. Domain name policy
F. Auditing and monitoring policy
G. Secure login process


Answer:
A. Information classification policy
B. Network access policy
F. Auditing and monitoring policy

Computer Science & Information Technology

You might also like to view...

You have the choice of running a single transaction to transfer |S300 from one of your savings accounts to another savings account at the same bank or of running two transactions, one to withdraw |S300 from one account and a second to deposit |S300 in the other. In the first choice the transfer is made atomically; in the second it is not. Describe a scenario in which after the transfer, the sum of the balances in the two accounts is different (from what it was when both transactions started) at the instant the transfer is complete. Hint: Other transactions might be executing at the same time that you are doing the funds transfer.

What will be an ideal response?

Computer Science & Information Technology

The TCP protocol uses a three-way handshake to create a connection.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In a gossip system, a front end has vector timestamp (3, 5, 7) representing the data it has received from members of a group of three replica managers. The three replica managers have vector timestamps (5, 2, 8), (4, 5, 6) and (4, 5, 8), respectively. Which replica manager(s) could immediately satisfy a query from the front end and what is the resultant time stamp of the front end? Which could incorporate an update from the front end immediately?

What will be an ideal response?

Computer Science & Information Technology

A greeting line in a letter is the ________

Fill in the blank(s) with correct word

Computer Science & Information Technology