1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SVEN [57.7K]
3 years ago
6

____ policy establishes criteria for classifying and securing the organization's information in a manner appropriate to its leve

l of security. a) Server security b) VPN security c) Acceptable encryption d) Information sensitivity
Computers and Technology
1 answer:
pav-90 [236]3 years ago
7 0

Answer:

Correct Answer is (d) Information sensitivity policy

Explanation:

Information sensitivity policy establishes the criteria for classifying and securing the organization's information in a manner that is appropriate to its level of security.

However, other options are incorrect. Server security can be established only on servers and on information/data that is in the server from unauthorized access. While VPN security is used for protecting network and encryption is used to encrypt data from illegal access.

However, only information sensitivity policy is used for classifying and securing organization information to the outside world.

The intention of information sensitivity policy:

The intention of using any information sensitivity policy is to help the employee to determine what information can be disclosed to non-employee, as well as the relative sensitivity of the information that should not be disclosed outside of the company without proper permission or authorization from supreme leadership of an organization.

You might be interested in
Can you withdraw from courses in top hat?
ad-work [718]

Answer:

Yes, but this must be done before the withdraw deadline

Explanation:

TopHat is an online learning platform. Students register for courses and if they decide not to continue with a course for reasons best known to them, they are allowed a time period usually one to two weeks to drop the courses. They are then reimbursed the fee for that particular course.

But if that time period elapses and they drop the course, that is considered a withdrawal that is not accepted and which no provisions for reimbursements are made.

7 0
2 years ago
(100 points) why does file explorer look like this and how do I fix it? I'm not good with computers, and I kinda need help
Degger [83]

Go To View -> Navigation Pane -> Then Click Navigation Pane

7 0
3 years ago
A document called a system requirements report describes the objectives for the information system.
kkurt [141]
A, true. Requirements describe the objectives of any assignment.
6 0
3 years ago
_______________________ covers unsolicited commercial e-mail messages and requires commercial e-mail senders to meet certain req
kondaur [170]

Answer:

CAN-SPAM

Explanation:

The CAN-SPAM act covers uninvited commercial e-mail messages and requires commercial e-mail senders to meet some requirements.This act was signed by president of united states of that time George Washington Bush in 2003.

So we can say that the answer to this question is CAN-SPAM.

7 0
3 years ago
A device which is not connected to the cpu is known as?​
Dvinal [7]

Answer:

would be called an Off-line device

3 0
3 years ago
Other questions:
  • Two electronics technicians are looking at the testing instrument in the figure above. Technician A says that this instrument is
    7·1 answer
  • The following program includes fictional sets of the top 10 male and female baby names for the current year. Write a program tha
    15·1 answer
  • Unix is called a(n) ___________ operating system because it can run on a desktop pc or a server. operating systems installed on
    7·1 answer
  • A user has a network device that streams media to the LAN. The device is visible on the network. All PCs on the LAN can ping the
    13·1 answer
  • Word documents contain how many sections by default?
    9·1 answer
  • Which of the following statements is FALSE?
    5·1 answer
  • This provides an easy method for workers to use their computers. FAT FAT RAM RAM DOS DOS GUI
    12·1 answer
  • With a(n) ____ you can arrive at a scene, acquire the data you need, and return to the lab as quickly as possible.
    14·1 answer
  • Redesign the cover of science textbook using at least two different graphics​
    7·1 answer
  • The users, groups, and roles that have access to a server are called ______________________________.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!