Register
28:00
Stop
CompTIA Security+ - Threat Analysis and Vulnerability Scanning - Security Policies and Procedures
Intermediate
1/28
Scenario 2: A manufacturing company is concerned about outsiders gaining unauthorized physical access to their facility. What security policy should be implemented to address this concern?
a.
Incident response policy
b.
Physical security policy
c.
Internet usage policy
d.
Remote access policy
Intermediate