<span><span>1. Loyalty
</span><span>2. Respectful
</span><span>3. Unconditionally There
</span><span>4. Trustworthy
</span><span><span>5. A Genuine Sounding Board
</span></span><span>6. Dependability</span></span>
Answer: False
Explanation: A security policy identifies all of a company's assets (critical databases, product capabilities, employee records, customer base etc) including potential threats to those assets. Security policy is a set of objectives for the company, rules of behavior for users and administrators, and requirements for system and management that as a whole ensures the security of network and computer systems in an organization. While it is useful to have uniformity of devices in and across an organisation, its consistency doesn't make security policies easier to enforce as these policies as a living document is never finished and is continuously updated as technology and employee needs or requirements change.
<em>"The Electoral College", </em>set out in Article II, Section 1 of the U.S. Constitution, allows states to have the same power of votes in spite of their number of population.
Due to that, a party could outcast the presidential candidate they don't want, even if such candidate was elected by the majority.
The parties nominate electors, usually by a central committee or the conventions; so when voters cast their ballot for President, they are actually voting for their <em>"State's Electors"</em>, who are not obliged to follow the results of the popular vote, thus sometimes <em>“faithless electors”</em> adversely choose a candidate they're not committed to.
A <em>"faithless elector</em><em>"</em> is simply a member of the "<em>Electoral College</em>" who votes against the party's candidate.
Thereby the answer is (B): <em>"It allows for faithless electors, or electors who do not vote according to the wishes of their states"</em>