Amy reads a document from her workstation:
1.Access the Aspen Bridge by telnet.
2.Enter into privileged mode.
3.Execute command 6 and press Enter.
4.Load the config file.
5.Hit Run.
What type of document is Amy reading?
A.
Policy
B.
Procedure
C.
Baseline
D.
Advisory
Explanation:
Procedures provide detailed steps that must be followed to achieve a certain goal.
They do not state specific security goals but are built in accordance with them.