Short Answer
Match the security policy element with the description.
Physical access _______
Antivirus ________
Acceptable use _______
Password _______
Email usage _________
Remote access _______
Emergency procedures ______
A. Everyone has the H: dive virtual storage to access at work.
B. Eight characters required with at least one special character.
C. The Infrastructure AVP will travel to the redundant site at the direction of the CIO.
D. Citrix must be used to access employee records from home.
E. Only security, network staff, and PC support have keys to the wiring closets.
F. Outlook storage is 2GB maximum.
G. Software to prevent the MBR from being changed must be updated whenever the PC attaches to the network or Internet.
Correct Answer:

Verified
Correct Answer:
Verified
Q15: A security policy is a policy written
Q16: What is the best way to protect
Q17: Vista does not support private folders.
Q18: Keeping the File and Print Sharing enabled
Q19: What character(s) are used to hide a
Q21: The iOS Settings > General option is
Q22: Phishing is controlled by using S/MIME.
Q23: If you have direct knowledge of organized
Q24: An antivirus application has found a file
Q25: What encryption is used with wireless networks?<br>A)