Multiple Choice
The part of the security policy that defines who has keys to the server room is
A) The acceptable use part
B) The physical access part
C) The remote access part
D) The emergency procedures part
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q61: A fingerprint scanner is what type of
Q62: What type of unsolicited message type is
Q63: Which of the following cannot be prevented
Q64: Which technology will help Karl when he
Q65: What technology is also known as a
Q67: A person with a Windows 7 Home
Q68: Which statement is true about network shares?<br>A)
Q69: A program that you have never used
Q70: Active scripts are used so that web
Q71: Another name for event logging is auditing.