What is the name of the security policy that identifies what user of a network are and are not allowed to do?
A) Tolerable use policy
B) Acceptable Internet policy
C) Acceptable use policy
D) Good practice policy
C
Explanation: An acceptable use policy (AUP) is the security policy that identifies what user of a network are and are not allowed to do.
Computer Science & Information Technology
You might also like to view...
To add a table to the Relationships window, click Show Table in the ________ tab
A) Relationships group on the Design B) Tools group on the Design C) Relationships group on the Database Tools D) Tools group on the Database Tools
Computer Science & Information Technology
To display and then add slides from another presentation, you click the New Slide arrow in the Slides group and select ________
A) Reuse Slides B) Find Slides C) Add Slides from Another Presentation D) View Slides from Another Presentation
Computer Science & Information Technology