Review Questions
1: | How does listing specific examples of violations make an acceptable usage policy more effective? |
2: | Why should the list of prohibited activities in an acceptable usage policy be left open-ended? |
3: | Why is a banner that is displayed before a user logs into a Unix server the optimal place to put an implicit agreement? |
4: | What is the primary protection that a “User Rights & Responsibilities” statement provides to users? |
5: | What are the attributes of an effective site security administrator? |
Get Unix® System Management Primer Plus now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.