Which of the following is the BEST way to ensure that outsourced service providers comply with the enterprise’s information security policy?
Which of the following BEST ensures that a firewall is configured in compliance with an enterprise’s security policy?
What type of policy would an organization use to forbid its employees from using organizational email for personal use?