What defines the restrictions on employees such as usage?
A) regulatory
B) advisory
C) availability
D) user policies
Correct Answer:
Verified
Q2: Compromising confidential information comes under _
A)bug
B)threat
C)vulnerability
D)attack
Q3: Which of the following are not security
Q4: Examples of User Policies is/are:
A)password policies
B)internet usage
C)system
Q5: _Policy ensures that the organization is maintaining
Q6: _ Policy is like standards rules and regulations
Q8: The full form of OSI is OSI
Q9: In layer, vulnerabilities are directly associated with
Q10: Which of the following attack can actively
Q11: Release of Message Content and Traffic analysis
Q12: If communication between 2 people is overheard
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents