The part of the security policy that defines who has keys to the server room is
A) The acceptable use part
B) The physical access part
C) The remote access part
D) The emergency procedures part
B
Computer Science & Information Technology
You might also like to view...
When you are a regular user, where are you positioned when you first log on to CentOS 7 and what permissions do you have?
What will be an ideal response?
Computer Science & Information Technology
When you open a query object, you ____ the query.
A. save B. run C. move D. engage
Computer Science & Information Technology