Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam SY0-601 topic 1 question 512 discussion

Actual exam question from CompTIA's SY0-601
Question #: 512
Topic #: 1
[All SY0-601 Questions]

A marketing coordinator is trying to access a social media application on a company laptop but is getting blocked. The coordinator opens a help desk ticket to report the issue. Which of the following documents should a security analyst review to determine whether accessing social media applications on a company device is permitted?

  • A. Incident response policy
  • B. Business continuity policy
  • C. Change management policy
  • D. Acceptable use policy
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
shady23
1 week, 4 days ago
Selected Answer: D
D. Acceptable use policy
upvoted 1 times
...
cyberPunk28
4 months, 3 weeks ago
Selected Answer: D
D. Acceptable use policy
upvoted 1 times
...
ApplebeesWaiter1122
9 months, 3 weeks ago
Selected Answer: D
The acceptable use policy (AUP) defines the rules and guidelines for using company resources, including computers, laptops, and other devices. It typically specifies what activities are allowed and prohibited on company devices, such as accessing social media applications. By reviewing the AUP, a security analyst can determine whether accessing social media applications on a company device is permitted or not.
upvoted 2 times
tonnage800
5 months, 3 weeks ago
Stop using ChatGPT please
upvoted 1 times
ID77
1 month ago
Stop harassing people!
upvoted 1 times
...
...
...
Gamsje
9 months, 3 weeks ago
Selected Answer: D
D. Acceptable use policy
upvoted 1 times
...
mtnews
10 months ago
Selected Answer: D
An acceptable use policy is an agreement between two or more parties that outlines the appropriate use of access to a corporate network or the internet. This document describes what users may and may not do when accessing this network.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...