Which of the following is NOT among the common guidelines that should be reflected in the rule base to implement an organization's security policy?

A. only authenticated traffic can access the internal network
B. employees can use instant-messaging only with external network users
C. the public can access the company Web servers
D. employees can have restricted Internet access

Answer: B

Computer Science & Information Technology

You might also like to view...

On a worksheet, if numbers appear as the column headings, then the reference style for Excel is A1

Indicate whether the statement is true or false

Computer Science & Information Technology

A series of text links across the top or bottom of a webpage that, when clicked, will link to another webpage on the same website

a. Navigation bar b. Rich text links c. Address bar

Computer Science & Information Technology