Your company has a secure network room with restricted access to a workstation that is located
in the room. Which policy can identify intrusions?
A.
Backup policy
B.
Audit policy
C.
Internet fair use policy
D.
User training policy
Your company has a secure network room with restricted access to a workstation that is located
in the room. Which policy can identify intrusions?
Your company has a secure network room with restricted access to a workstation that is located
in the room. Which policy can identify intrusions?
A.
Backup policy
B.
Audit policy
C.
Internet fair use policy
D.
User training policy