How to deal with a virus attack would be detailed under which of the following?

A. acceptable user policy
B. security policy
C. configuration policy
D. baseline

Answer: B

Computer Science & Information Technology

You might also like to view...

If you want the data in a table to recalculate automatically when edited, you should use a ________ program

A) word processing B) desktop publishing C) presentation graphics D) spreadsheet

Computer Science & Information Technology

Layers of information can be presented simultaneously by using a video ________ with text on a slide

Fill in the blank(s) with correct word

Computer Science & Information Technology