The part of the security policy that defines the appropriate use of company data is

A) The acceptable use part
B) The physical access part
C) The remote access part
D) The emergency procedures part

A

Computer Science & Information Technology

You might also like to view...

Can private IP addresses be routed?

What will be an ideal response?

Computer Science & Information Technology

In XSLT, a variable can store a _____.

A. ?numeric value B. ?text string C. ?node set from an XML document D. ?All of these are correct.

Computer Science & Information Technology