How to deal with a virus attack would be detailed under which of the following?
A. acceptable user policy
B. security policy
C. configuration policy
D. baseline
Answer: B
Computer Science & Information Technology
You might also like to view...
If you want the data in a table to recalculate automatically when edited, you should use a ________ program
A) word processing B) desktop publishing C) presentation graphics D) spreadsheet
Computer Science & Information Technology
Layers of information can be presented simultaneously by using a video ________ with text on a slide
Fill in the blank(s) with correct word
Computer Science & Information Technology