1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SVEN [57.7K]
3 years ago
6

____ policy establishes criteria for classifying and securing the organization's information in a manner appropriate to its leve

l of security. a) Server security b) VPN security c) Acceptable encryption d) Information sensitivity
Computers and Technology
1 answer:
pav-90 [236]3 years ago
7 0

Answer:

Correct Answer is (d) Information sensitivity policy

Explanation:

Information sensitivity policy establishes the criteria for classifying and securing the organization's information in a manner that is appropriate to its level of security.

However, other options are incorrect. Server security can be established only on servers and on information/data that is in the server from unauthorized access. While VPN security is used for protecting network and encryption is used to encrypt data from illegal access.

However, only information sensitivity policy is used for classifying and securing organization information to the outside world.

The intention of information sensitivity policy:

The intention of using any information sensitivity policy is to help the employee to determine what information can be disclosed to non-employee, as well as the relative sensitivity of the information that should not be disclosed outside of the company without proper permission or authorization from supreme leadership of an organization.

You might be interested in
When searching for your word processing file to finish writing your report, you should look for a file with which extension? (6
trasher [3.6K]

Answer:

doc

Explanation:

6 0
3 years ago
If A = 5 i + j abd B = 2k then A - B in equal to​
Leto [7]

the answer is A-B=5i+j-2k

8 0
3 years ago
Suppose that a laptop identifies its processor as follows: AMD’s A84500M. What does the AMD represent?
zalisa [80]

Answer:

Advanced Micro Devices

Explanation:

4 0
3 years ago
Use set builder notation to describe these sets.
statuscvo [17]

Answer:

a) S1 = { 2^x | x belongs to the set of Whole Numbers}

b) S2 = { 2+3(x-1) | x belongs to Natural Numbers }

c) S3 = { x^2 | x belongs to the set of Natural Numbers  }

d) S4 = { x | x belongs to English Alphabet }

e) S5 = { x | x is a <em>Vowel</em> of English Alphabet}

Explanation:

Whole Numbers = {0, 1, 2, 3, ...}

Natural Numbers = {1, 2, 3, ...}

English Alphabet={a, b, c, d, e, ... , x, y, z }

Vowels of English Alphabet = {a, e, i, o, u}

8 0
3 years ago
URGENT!! What is the most suitable use for bitmap images?
ELEN [110]

B. Photographs

Logos, line drawings, and animations are always better as vector images, which basically means the image has an infinite resolution.

7 0
3 years ago
Read 2 more answers
Other questions:
  • A school librarian has been asked to identify inappropriate Internet usage. Which students would most likely be reported to the
    5·2 answers
  • A usability study compares the number of page visits on a web site. Half of the participants saw Version A of the home page. The
    13·1 answer
  • If a user wants to change one small section of the formatting of a document and leave the rest the same, which process should be
    14·1 answer
  • Question 3.3. Which of the following is NOT a computer protocol? FTP SMTP ISP TCP
    11·1 answer
  • What are the careers needed to create a video game? Name all the careers involved please.
    15·1 answer
  • As a prospective student, what is the best reason to request an interview with your college application?
    6·1 answer
  • Give short answers.
    14·1 answer
  • John buy cheap stolen rims for his new truck?
    11·1 answer
  • Write a function called add_tuples that takes three tuples, each with two values, and returns a single tuple with two values con
    7·1 answer
  • * Describe the five components of a<br> computer
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!