• Post author:
  • Post category:Blog
  • Reading time:1 mins read
  • Post last modified:June 12, 2024

Which section of a security policy is used to specify that only authorized individuals should have access to enterprise data?

  • statement of scope
  • statement of authority
  • Internet access policy
  • acceptable use policy
  • campus access policy
  • identification and authentication policy
Answers Explanation & Hints:

The identification and authentication policy section of the security policy typically specifies authorized persons that can have access to network resources and identity verification procedures.

For more Questions and Answers:

CyberOps Associate v1.0 & CA 1.02 Practice Final Exam Answers Full 100%

Notify of
Inline Feedbacks
View all comments