What type of information security policy document should define the procedures users should follow if they suspect misuse of corporate computing resources by an employee or other affiliate?

a. Backup policy
b. Data retention policy
c. Acceptable use policy
d. Confidentiality policy

Answer: c. Acceptable use policy

Computer Science & Information Technology

You might also like to view...

Volume Shadow Copy Services (VSS) creates point-in-time copies, known as snapshots, of user files located on server shares. With just a few clicks, users can roll back to previous versions of the files

What will be an ideal response?

Computer Science & Information Technology

Case 2You have started to create a new video. You are working in Adobe Premiere Elements. Answer the following questions about working with Adobe Premiere. Which button do you click to start creating a new video in Adobe Premiere Elements?

A. The Open Project button B. The Start New Video button C. The New Project button D. The My Video button

Computer Science & Information Technology