FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

COMPUTER SECURITY POLICIES EXAMPLES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Network policies stop you going on any websites other than those approved by the administrator.
A
False
B
True
C
Either A or B
D
None of the above
Explanation: 

Detailed explanation-1: -Network policies are sets of conditions, constraints, and settings that allow you to designate who is authorized to connect to the network and the circumstances under which they can or cannot connect.

Detailed explanation-2: -There are multiple benefits associated with well-executed network policies. The majority of these revolve around streamlining and securing your business operations. If you have a large computer network, then these can be used to optimize your company’s workflow.

Detailed explanation-3: -They include Acceptable Use, Disaster Recovery, Back-up, Archiving and Failover policies. People who need access to a network to do their job are usually asked to sign an agreement that they will only use it for legitimate reasons related to doing their job before they are allowed access.

There is 1 question to complete.