COMPUTER THREATS SECURITY
COMPUTER SECURITY POLICIES EXAMPLES
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
False
|
|
True
|
|
Either A or B
|
|
None of the above
|
Detailed explanation-1: -Network policies are sets of conditions, constraints, and settings that allow you to designate who is authorized to connect to the network and the circumstances under which they can or cannot connect.
Detailed explanation-2: -There are multiple benefits associated with well-executed network policies. The majority of these revolve around streamlining and securing your business operations. If you have a large computer network, then these can be used to optimize your company’s workflow.
Detailed explanation-3: -They include Acceptable Use, Disaster Recovery, Back-up, Archiving and Failover policies. People who need access to a network to do their job are usually asked to sign an agreement that they will only use it for legitimate reasons related to doing their job before they are allowed access.