Multiple Choice
A _______ policy states that the company may access, monitor, intercept, block access, inspect, copy, disclose, use, destroy, or recover using computer forensics any data covered by this policy.
A) standard of conduct
B) unlawful activity prohibited
C) company rights
D) business use only
Correct Answer:

Verified
Correct Answer:
Verified
Q10: Security education is most often taught by
Q11: _ can include computer viruses, Trojan horse
Q12: Programmers, developers, and system maintainers require lessadvanced
Q13: _ is a benefit of security awareness,
Q14: Awareness is used to explain the rules
Q16: Security basics and literacy is required for
Q17: _ lists the following security objective with
Q18: _ need training on the development of
Q19: _ scan critical system files, directories, and
Q20: Network and host _ monitor and analyze