A security policy is a _____.

a. set of guidelines
b. set of transmission protocols
c. written document
d. set of rules based on standards and guidelines

Answer: d. set of rules based on standards and guidelines

Computer Science & Information Technology

You might also like to view...

What is the correct formula for calculating the number of usable host IP addresses in a subnet?

A) 2x, X = host bits B) 2x, X = network bits C) 2x - 2, X = network bits D) 2x - 2, X = host bits

Computer Science & Information Technology

What is the difference between a fixed size virtual disk and a dynamic virtual disk?

What will be an ideal response?

Computer Science & Information Technology