Question: A comprehensive security policy is not just one document but rather a collection of documents. One such document is called an Acceptable use policy
A comprehensive security policy is not just one document but rather a collection of documents. One such document is called an "Acceptable use policy". Which of the policies listed below would you expect to find in an "acceptable use policy" document? Please select all that apply.
| 1. | Internet usage | |
| 2. | Which routing protocol to run | |
| 3. | Usage of personal mobile devices on the organzation's WIFI network | |
| 4. | Usage of company computers for personal usage |
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
