{"id":6430,"date":"2022-12-01T19:11:59","date_gmt":"2022-12-01T13:11:59","guid":{"rendered":"https:\/\/mcqacademy.com\/en\/?post_type=mcq&#038;p=6430"},"modified":"2022-12-01T19:26:17","modified_gmt":"2022-12-01T13:26:17","slug":"a-college-student-logs-onto-a-college-computer-for-the-first-time-which-security-policy-category-should-be-presented-to-the-student","status":"publish","type":"mcq","link":"https:\/\/mcqacademy.com\/en\/mcq\/a-college-student-logs-onto-a-college-computer-for-the-first-time-which-security-policy-category-should-be-presented-to-the-student\/","title":{"rendered":"A college student logs onto a college computer for the first time. Which security policy category should be presented to the student?"},"content":{"rendered":"","protected":false},"author":1158,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","topic":[955],"subject":[954],"class_list":["post-6430","mcq","type-mcq","status-publish","hentry","topic-introduction-to-computer-studies","subject-information-technology-essentials"],"mcq_note":"<strong>Explanation:<\/strong>\r\n\r\nThe acceptable use policies section of a security policy commonly identifies network resources and usages that are acceptable to the organization. They might also state the ramifications that can occur if this security policy is violated.","mcq_options":[{"right":"yes","answer":"acceptable use policies"},{"right":"no","answer":"identification and authentication policies"},{"right":"no","answer":"incident handling policies"},{"right":"no","answer":"network maintenance policies"}],"multi_answers":"no","subject_terms":[{"id":954,"title":"Information Technology Essentials (ITE)","slug":"information-technology-essentials"}],"topic_terms":[{"id":955,"title":"Introduction to Computer Studies","slug":"introduction-to-computer-studies"}],"_links":{"self":[{"href":"https:\/\/mcqacademy.com\/en\/wp-json\/wp\/v2\/mcq\/6430","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mcqacademy.com\/en\/wp-json\/wp\/v2\/mcq"}],"about":[{"href":"https:\/\/mcqacademy.com\/en\/wp-json\/wp\/v2\/types\/mcq"}],"author":[{"embeddable":true,"href":"https:\/\/mcqacademy.com\/en\/wp-json\/wp\/v2\/users\/1158"}],"replies":[{"embeddable":true,"href":"https:\/\/mcqacademy.com\/en\/wp-json\/wp\/v2\/comments?post=6430"}],"wp:attachment":[{"href":"https:\/\/mcqacademy.com\/en\/wp-json\/wp\/v2\/media?parent=6430"}],"wp:term":[{"taxonomy":"topic","embeddable":true,"href":"https:\/\/mcqacademy.com\/en\/wp-json\/wp\/v2\/topic?post=6430"},{"taxonomy":"subject","embeddable":true,"href":"https:\/\/mcqacademy.com\/en\/wp-json\/wp\/v2\/subject?post=6430"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}