What is the name of the security policy that identifies what user of a network are and are not allowed to do?

A) Tolerable use policy
B) Acceptable Internet policy
C) Acceptable use policy
D) Good practice policy

C
Explanation: An acceptable use policy (AUP) is the security policy that identifies what user of a network are and are not allowed to do.

Computer Science & Information Technology

You might also like to view...

To add a table to the Relationships window, click Show Table in the ________ tab

A) Relationships group on the Design B) Tools group on the Design C) Relationships group on the Database Tools D) Tools group on the Database Tools

Computer Science & Information Technology

To display and then add slides from another presentation, you click the New Slide arrow in the Slides group and select ________

A) Reuse Slides B) Find Slides C) Add Slides from Another Presentation D) View Slides from Another Presentation

Computer Science & Information Technology