Which section of a security policy is used to specify that only authorized individuals should have access to enterprise data?
- statement of authority
- statement of scope
- campus access policy
- Internet access policy
- identification and authentication policy
- acceptable use policy
Explanation: The identification and authentication policy section of the security policy typically specifies authorized persons that can have access to network resources and identity verification procedures.
Exam with this question: CCNA Cyber Ops (v1.1) – Chapter 8 Exam Answers
Exam with this question: CyberOps Associate (Version 1.0) - CyberOps Associate 1.0 Practice Final exam
Exam with this question: Module 3: Quiz – Mitigating Threats Network Security
Exam with this question: Network Defense - 1.4.2 Module 1: Understanding Defense Quiz
Please login or Register to submit your answer