Which section of a security policy is used to specify that only authorized individuals should have access to enterprise data?

IT Questions BankCategory: CCNA CyberOpsWhich section of a security policy is used to specify that only authorized individuals should have access to enterprise data?

Which section of a security policy is used to specify that only authorized individuals should have access to enterprise data?

  • statement of authority
  • statement of scope
  • campus access policy
  • Internet access policy
  • identification and authentication policy
  • acceptable use policy

Explanation: The identification and authentication policy section of the security policy typically specifies authorized persons that can have access to network resources and identity verification procedures.

More Questions: CCNA Cyber Ops (v1.1) – Chapter 8 Exam Answers
More Questions: CyberOps Associate (Version 1.0) – CyberOps Associate 1.0 Practice Final exam
More Questions: Module 3: Quiz – Mitigating Threats Network Security

More Questions: Network Defense – 1.4.2 Module 1: Understanding Defense Quiz


guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x