Generally considered to be the most important information security policies, what item below defines the actions a user may perform while accessing systems and networking equipment?A. Acceptable use policiesB. Encryption policiesC. Data loss policiesD. VPN policies

Respuesta :

Answer:

A. Acceptable use policies

Explanation:

These specific actions that the user may perform are all described in the acceptable use policy. The company usually requires that the user read and sign this policy before being granted a network ID into the system itself. By signing this agreement the individual user agrees to perform ONLY the actions listed in the agreement and nothing else and are restricted from unauthorized areas.