1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alla [95]
4 years ago
5

A Security Policy is: a. How we implement security b. Corporate direction on behavior c. A statement of consequence for failure

to obey d. A statement describing how we intend to manage a specific security activity e. None of the above
Computers and Technology
1 answer:
nydimaria [60]4 years ago
7 0

Answer:

A Security Policy is: d. A statement describing how we intend to manage a specific security activity

Explanation:

A Security Policy is a document written in a format recognized by an organization that explains how the organization is going to carry on a process of maintaining the security of a specific task developed by the organization. So option a is incorrect because it is not a document written and recognized by the organization in the matter. The rest is false because b is code o conduct, and c a rule.

You might be interested in
Which of the following Google tools support collaboration? Docs Sheets Slides All of the Above
azamat

Which of the following Google tools support collaboration?

1. Docs

2. Sheets

3. Slides

4. All of the Above


Ans. <u>4. All of the Above</u>

5 0
3 years ago
A _______ area network is a type of wireless network that works within your immediate surroundings to connect cell phones to hea
MakcuM [25]

Answer:

Home

Explanation:

5 0
3 years ago
Read 2 more answers
Which devices are managed through device management? Device management is the process of managing----(blank)-----devices.
Trava [24]

It is the process of managing the implementation and maintenance of physical and/or virtual devices. It has various administrative tools for the maintenance and upkeep of a computing, mobile, network, and virtual devices. When we talk about devices, we usually refer to the hardware devices such as computers, laptops, and more. Device management typically installs device and component-level drivers, configure a device so it performs as expected, and implement security measures and processes.

4 0
3 years ago
Mention five of the format tools use to edit a picture in a word document<br>​
yKpoI14uk [10]

in microsoft word, you can 1. crop the image, 2. format the image colors, 3. add special effects, 4. compressing the image.

5 0
3 years ago
Sean is studying at a friend's house and notices that he can connect to the wireless network without entering a wireless network
polet [3.4K]
It is a personal network of Sean’s friends family’s
5 0
3 years ago
Other questions:
  • Consider the following code snippet.a.File inputFile = new File("dataIn.txt");b.Scanner in = new Scanner(inputFile);c.while (in.
    7·1 answer
  • Heavenly bodies formed because of gravity<br><br> T or F
    10·1 answer
  • What is the exact number of bits in a memory that contains (a) 128k bits?
    9·1 answer
  • A network administrator receives a call from the sales department requesting ports 20 and 21 be opened on the company’s firewall
    12·1 answer
  • Using for loop . Input an integer and identify whether it's EVEN OR ODD ( without using modulo operator )
    9·1 answer
  • What is the value stored at x, given the statements:
    11·1 answer
  • 5. Compare the telephone network and the internet. What are the similarities? What are the differences?
    12·1 answer
  • By what other name can the folders in Windows 7 be called?
    5·1 answer
  • We begin with a computer implemented in a single-cycle implementation. When the stages are split by functionality, the stages do
    13·1 answer
  • Responsible manner in video and audio conferencing​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!