What type of information security policy document should define the procedures users should follow if they suspect misuse of corporate computing resources by an employee or other affiliate?
a. Backup policy
b. Data retention policy
c. Acceptable use policy
d. Confidentiality policy
Answer: c. Acceptable use policy
Computer Science & Information Technology
You might also like to view...
Which of the following is not a sequence container provided by the Standard Library?
a. vector b. array c. list d. deque
Computer Science & Information Technology
What does the following code do?
1 int m_intAge; 2 objSelectAgeData.Parameters[ "Name" ].Value = "Bob"; 3 4 objOleDbConnection.Open(); 5 6 OleDbDataReader objReader = 7 objSelectAgeData.ExecuteReader(); 8 9 objReader.Read(); 10 11 m_intAge = Convert.ToInt32( objReader[ "Age" ] ); 12 13 objReader.Close(); 14 objOleDbConnection.Close();
Computer Science & Information Technology
The Option Compare Database statement is used in a module to require that all variables be declared before they are used
Indicate whether the statement is true or false
Computer Science & Information Technology
The _______________ feature enables smartphones to receive broadcasts from national emergency broadcast systems, such as the Emergency Alert System (EAS) in the United States.
A. emergency notification B. airplane mode C. geotracking D. virtual assistant
Computer Science & Information Technology