Question 2 of 10

How do you develop and maintain a network security policy for an enterprise? What should the policy cover, and how do you ensure it is both effective and enforceable?