Which section of a security policy is used to specify that only authorized individuals should have access to enterprise data?
- statement of authority
- statement of scope
- campus access policy
- Internet access policy
- identification and authentication policy
- acceptable use policy
Explanation: The identification and authentication policy section of the security policy typically specifies authorized persons that can have access to network resources and identity verification procedures.
More Questions: CCNA Cyber Ops (v1.1) – Chapter 8 Exam Answers
More Questions: CyberOps Associate (Version 1.0) – CyberOps Associate 1.0 Practice Final exam
More Questions: Module 3: Quiz – Mitigating Threats Network Security
More Questions: Network Defense – 1.4.2 Module 1: Understanding Defense Quiz