Which of the following is NOT a guideline of a security policy?

A. easy for users to understand
B. should be enforceable
C. uses legal terminology to protect the organization
D. clearly state the policy objectives


Answer: C

Computer Science & Information Technology

You might also like to view...

Terminal operations are ________; they perform the requested operation when they are called.

a. immediate b. idle c. lazy d. eager

Computer Science & Information Technology

The ________ must be considered as presentation slides are designed

A) number of slides in the presentation B) presentation size C) presentation audience D) timing of a presentation

Computer Science & Information Technology

The "tight" and "open" paragraph spacing formats are multiple 1.15 line spacing

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following is a typical responsibility of the planning process group?

A. setting the project goal B. identifying the project manager C. identifying project budget and quality considerations D. entering project tasks, durations, and relationships

Computer Science & Information Technology