What is the name of the security policy that identifies what user of a network are and are not allowed to do?

A) Tolerable use policy
B) Acceptable Internet policy
C) Acceptable use policy
D) Good practice policy


C
Explanation: An acceptable use policy (AUP) is the security policy that identifies what user of a network are and are not allowed to do.

Computer Science & Information Technology

You might also like to view...

Why shouldn't information about specific systems be included in a job description?

A. To make sure candidates know all systems B. To protect against social engineering and other attacks C. To get as many candidates as possible D. To get more knowledgeable candidates

Computer Science & Information Technology

No vCloud account is required in order to set up a vCloud virtual data center (VDC), although it is preferred.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Microsoft Office ________ is an application that is used to store quantitative data and to perform accurate and rapid calculations.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What kind of items can be stored on the Office Clipboard?

A. Items collected from Word only. B. Items collected from any program. C. Items collected from any word processing program. D. Items collected from any Office program.

Computer Science & Information Technology