Home / Aptitude Tests / Computer Science / Which of the followi...

Which of the following is not a good ICT security policy?...