Select all of the following statements regarding security policy that are true.

a. Your company should have a written security policy, and all employees should have access to the policy, even if they're casual workers.
b. Your small, home-based business probably is not at risk from hackers.
c. Access to sensitive data should be limited to only to employees who have worked for the company for more than six months.
d. Training on computer security should be provided for all staff members.

Answer:
a. Your company should have a written security policy, and all employees should have access to the policy, even if they're casual workers.
d. Training on computer security should be provided for all staff members.

Computer Science & Information Technology

You might also like to view...

Match the following terms to their meanings:

I. Denotes the amount of CPU capability that is not A. CPU Time being used II. Collection of tools with which you can perform B. network interface card tasks such as configuring hard disks III. Measures how long it takes for a processor to C. System Idle Process complete a task IV. Enables your computer to communicate with D. Resource Overview a network V. CPU usage, hard disk drive usage, network usage, E. Computer Management and memory usage instantaneous readouts

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. A boolean expression may evaluate to more than 2 values 2. A function may return a boolean value. 3. In an enumerated data type, different constants may not have the same value. 4. All switch statements can be converted into nested if-else statements 5. All nested if-else statements can be converted into switch statements.

Computer Science & Information Technology