A security policy is a _____.
a. set of guidelines
b. set of transmission protocols
c. written document
d. set of rules based on standards and guidelines
Answer: d. set of rules based on standards and guidelines
Computer Science & Information Technology
You might also like to view...
What is the correct formula for calculating the number of usable host IP addresses in a subnet?
A) 2x, X = host bits B) 2x, X = network bits C) 2x - 2, X = network bits D) 2x - 2, X = host bits
Computer Science & Information Technology
What is the difference between a fixed size virtual disk and a dynamic virtual disk?
What will be an ideal response?
Computer Science & Information Technology