FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

COMPUTER SECURITY POLICIES EXAMPLES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Network policies contain information about the actions the providers of the network will take upon its misuse.
A
True
B
False
C
Either A or B
D
None of the above
Explanation: 

Detailed explanation-1: -Network policies are sets of conditions, constraints, and settings that allow you to designate who is authorized to connect to the network and the circumstances under which they can or cannot connect.

Detailed explanation-2: -The purpose of this policy is to define the standards for connecting computers, servers or other devices to the University’s network.

Detailed explanation-3: -Network policy is a collection of rules that govern the behaviors of network devices. Just as a federal or central government may lay down policies for state or districts to follow to achieve national objectives, network administrators define policies for network devices to follow to achieve business objectives.

Detailed explanation-4: -They include Acceptable Use, Disaster Recovery, Back-up, Archiving and Failover policies.

There is 1 question to complete.