1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mkey [24]
2 years ago
11

List at least four items that security policy should include

Computers and Technology
1 answer:
forsale [732]2 years ago
4 0

Answer:

Purpose.

Audience.

Information security objectives.

Authority and access control policy.

Data classification.

Data support and operations.

Security awareness and behavior.

Encryption policy.

You might be interested in
How do i block somebody on here, theyre making me have a panic attack. /srs
spin [16.1K]

Answer:

If someone is disturbing you a lo then you can report him/her.

  • Go to g-mail.
  • Type a message to US Support.
  • Add a screenshot of him/her whom you want to report.
  • Use polite words
  • At last, send it.

You will get soon response.

5 0
3 years ago
Read 2 more answers
Do you want to run a listing to see files that were used by the last access date is date does not display by default which comma
FromTheMoon [43]

Considering the situation and the computer application, the command you would use to find additional properties of the files to reference is "<u>Get-childitem | get-member "</u>

<h3>What is Get-childitem command?</h3>

Get-childitem command in computer applications is used to get the items in specific locations.

Get-childitem command can be used to gets the items inside a file container, usually referred to as child items.

Similarly, the Get-member command used to gets the members, the properties, and methods of files.

Hence, in this case, it is concluded that the correct answer is <u>Get-childitem | get-member </u>

Learn more about Computer commands here: brainly.com/question/25243683

3 0
2 years ago
2.
zepelin [54]

Answer:

D. parking brake

Explanation:

4 0
3 years ago
To show the growth comparisons of your company from one year to the next, a _____ can be included in your PowerPoint presentatio
777dan777 [17]

a column chart can show both years side by side

8 0
3 years ago
Read 2 more answers
The first step in designing a website is the definition of the user to which it is intended. true or false
xxTIMURxx [149]
The answer to this question is true
8 0
3 years ago
Other questions:
  • What can you say about the following Java class definition?
    10·1 answer
  • Which unique address is a 128-bit address written in hexadecimal?
    13·1 answer
  • Convert the following Base 2 (binary) numbers to base 10(decimal):<br> 11101<br> 1010101
    13·1 answer
  • A class of cryptographic algorithms which requires two separate keys, one of which is secret (or private) and one of which is pu
    11·1 answer
  • ANYONE WITH K12 OHVA HIGH SCHOOL LAPTOP! I successfully enter my schools homepage and can login. BUT once I am logged in, it say
    9·2 answers
  • In open addressing with linear probing we must consider how to encode
    13·1 answer
  • What is an abstract data type?
    5·1 answer
  • Given the following array definition, write a constant declaration named ArraySize that automatically calculates the size in byt
    5·1 answer
  • Ayudaaaaa, Instale el software equivocado a mi tv westinghause con placa tp.Ms338.Pb801 y ahora queda en negro, ¿Cómo lo puedo s
    15·1 answer
  • Mainframe computers have several CPUs, have very fast processor speeds, can supporting multiple operating systems and have huge
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!