In the past, a company has experienced several network breaches as a result of end-user actions. To help mitigate future breaches, which of the following documents should the security team ensure are up-to-date and enforced for all employees? (Select TWO)

A. Memorandum of understanding
B. Data classification document
C. Service level agreement
D. Interconnection security agreement
E. Consent to monitor
F. Acceptable use policy

Answer:
A. Memorandum of understanding
F. Acceptable use policy

Computer Science & Information Technology

You might also like to view...

A group of related tables is called a(n) ________ database

Fill in the blank(s) with correct word

Computer Science & Information Technology

When inserting bullets into a table cell, which of the following is NOT true?

A) The bullet can easily be changed to a number, if desired. B) The bullet will not appear flush to the left of the cell. C) The bullet will appear centered vertically in the cell. D) The bullet can be moved using the Increase/Decrease indent buttons.

Computer Science & Information Technology