FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
A policy that defines the actions users may or may not perform while accessing systems and networking equipment is known as:
A
Password Policy
B
End User License Agreement
C
Acceptable Use Policy
D
Email Policy
Explanation: 

Detailed explanation-1: -A due process policy is a policy that defines the actions users may perform while accessing systems and networking equipment.

Detailed explanation-2: -Acceptable Use Policy (AUP) A policy that defines the actions users may perform while accessing systems and networking equipment.

Detailed explanation-3: -An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network, the internet or other resources.

Detailed explanation-4: -An acceptable use policy usually: Includes specific rules, such as no video pirating. Outlines consequences for breaking the rules, such as warnings or suspension of access. Details an organization’s philosophy for granting access (for example, internet use is a privilege that can be revoked, rather than a right)

Detailed explanation-5: -An acceptable use policy defines the acceptable level of access to information assets for different users. Biometric authentication is the use of physical characteristics such as retinal images to provide identification. Packet filtering catches most types of network attacks.

There is 1 question to complete.