1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
EleoNora [17]
4 years ago
12

It is advised to always have discretion with leaders. Explain in general terms what information security policies can and cannot

achieve. It is equally important to be conservative in your estimates regarding the impact on the business; otherwise you risk losing credibility. Is this true or false? Explain.
Computers and Technology
1 answer:
JulsSmile [24]4 years ago
4 0

Answer:

Explanation:

Information security policies helps to protect information and reduce risk of inappropriate access to data information, modification of information and then disclosure of classified information. Information securities helps to promote and protect confidentiality. This information are protected using password, encryption,legal liability.

Information policies need to be upheld, the policies are guide to information credibility when the rules and guidance are not followed

and adhered to information or data kept can be lost. They are as important as the people handling it.

It is true that estimate regarding a business should be conserved and this could risk credibility. Each organization and business have some classified information about how they operate and run their business when such data cannot be protected it could become a threat hence all information and estimates should be well conserved.

You might be interested in
What are ya'll discords???
Mrac [35]

Answer: yall are so mean i had to edit this

Explanation: I had that for so long lol

4 0
3 years ago
Read 2 more answers
The =COUNT function calculates what value?
Valentin [98]

The correct answer is letter c


8 0
4 years ago
Read 2 more answers
The primary function of the average command is what?
Blababa [14]
The primary function of the average command is the:


Answer: 

Aligning Anchor Points
4 0
3 years ago
Which of the following office online apps is most effective for creating multi media presentation
Brrunno [24]
Google slides is the best out there
3 0
3 years ago
Read 2 more answers
entry that has the address of 192.168.101.0 and the wildcard mask of 0.0.0.255. What is the range of IPv4 addresses that will be
svp [43]

Answer:

192.168.101.0 through 192.168.101.255 is the correct answer.

Explanation:

The following answer is correct because the address of the ACL entry is 192.168.101.0 and 0.0.0.255 is the wildcard mask then, the range of the IPv4 addresses is 192.168.101.0 through 192.168.101.255 that affected by the ACL.

ACL is referred as the access control list that acts as the firewall which secures the VPC network of the user.

6 0
3 years ago
Other questions:
  • When using a target drive that is fat32 formatted, what is the maximum size limitation for split files?â?
    12·1 answer
  • How can a Word user insert a page break into a document to isolate a table on a new page?
    13·2 answers
  • Meaning of page break​
    8·1 answer
  • Below is an image from Google Trends that plots Cats and Dogs. It shows a line that is higher for dogs than cats. Choose the mos
    11·1 answer
  • Does artificial intelligence have a place in our society why or why not
    5·2 answers
  • Which of the following describes a characteristic of organic light-emitting diodes (OLEDs) used in clothing?
    6·2 answers
  • What does l m a o actually mean?
    6·1 answer
  • if someone has become very attached to their mobile device and feels anxious if the cannot connect to the internet, what are the
    7·1 answer
  • Click this link to view O*NET’s Tasks section for Farmworkers and Laborers, Crop.
    6·1 answer
  • Older systems that often contain data of poor quality are called ________ systems.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!