What type of information security policy document should define the procedures users should follow if they suspect misuse of corporate computing resources by an employee or other affiliate?

a. Backup policy
b. Data retention policy
c. Acceptable use policy
d. Confidentiality policy


Answer: c. Acceptable use policy

Computer Science & Information Technology

You might also like to view...

Which of the following is not a sequence container provided by the Standard Library?

a. vector b. array c. list d. deque

Computer Science & Information Technology

What does the following code do?

1 int m_intAge;
2 objSelectAgeData.Parameters[ "Name" ].Value = "Bob";
3
4 objOleDbConnection.Open();
5
6 OleDbDataReader objReader =
7 objSelectAgeData.ExecuteReader();
8
9 objReader.Read();
10
11 m_intAge = Convert.ToInt32( objReader[ "Age" ] );
12
13 objReader.Close();
14 objOleDbConnection.Close();

Computer Science & Information Technology

The Option Compare Database statement is used in a module to require that all variables be declared before they are used

Indicate whether the statement is true or false

Computer Science & Information Technology

The _______________ feature enables smartphones to receive broadcasts from national emergency broadcast systems, such as the Emergency Alert System (EAS) in the United States.

A. emergency notification B. airplane mode C. geotracking D. virtual assistant

Computer Science & Information Technology