1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mumz [18]
2 years ago
9

​You work for a company that is growing. Originally, all the users in all departments had access to all the data in the database

. It is considered a security risk. What is an appropriate action to reduce the risk?a. Install and provide stronger anti-virus software on the users' computers.b. Assign roles and privileges to users so that only job-relevant data is accessible to the user.c. Tweak the firewall parameters so that outgoing traffic can be better controlled.d. Install a two-step login procedure, where the user has to key in additional information for logging in.
Computers and Technology
1 answer:
jeyben [28]2 years ago
5 0

Answer:

B. Assign roles and privileges to users so that only job-relevant data is accessible to the user.

Explanation:

Certain departments will require certain information for certain processes. It is not recommendable for every user to access every information of the company as it may reveal vital information.

Hence, every role and department should be given certain privileges to information according to the tasks and needs of the role.

You might be interested in
Natalie enjoys talking to people and helping them with their problems. Her friends always tell her that she’s a good listener. B
Akimi4 [234]

Answer:

C and D

Explanation:

The other 3 answers don't even involve talking.

7 0
3 years ago
Read 2 more answers
What are the five parts of computer hardware that can be found in most computer systems?
pashok25 [27]

Answer:

processor, primary storage, secondary storage, input devices and output devices

Explanation:

processor, primary storage, secondary storage, input devices and output devices are the five parts of computer hardware that can be found in most computer systems

8 0
2 years ago
What is fair use?
koban [17]

Answer:

I believe its C

Explanation:

I'm sorry if its wrong...

8 0
3 years ago
Read 2 more answers
Suppose that a CPU scheduling algorithm favors those processes that have used the least processor time in the recent past. Why w
avanturin [10]

Answer:

I/O bound programs will be favored due to the CPU burst request of the I/O programs. This is because their CPU burst request is short and would release the CPU within a short period.

Due to the brief request time of the I/O programs on the CPU, CPU-bound programs will not be permanently starved. After a little while, CPU resources will be released to the CPU-bound programs for use.

6 0
3 years ago
Driver's ed I need help
UkoKoshka [18]
The second one I believe 
8 0
3 years ago
Read 2 more answers
Other questions:
  • ATMs are particularly helpful for people on unusual schedules.<br> a. True<br> b. False
    5·2 answers
  • Cerinţa
    15·1 answer
  • Emerson needs to tell his browser how to display a web page. Which tool will he use?
    8·2 answers
  • Create a class named Console, and move all the methods that retrieve and validate user input to that class. These methods can re
    7·1 answer
  • People are starting to type in whole questions rather than specific words, which leads credence to having _____ that have this a
    14·1 answer
  • There are....... section in<br>cpu<br>​
    15·1 answer
  • Why are object-oriented languages very popular?
    11·2 answers
  • Which of the following did you include in your notes?
    7·1 answer
  • Which of the following is not a use of a hash function
    7·1 answer
  • 20 POINTS! Which music making software is better? Ableton Live or Logic Pro? Name the advantages and disadvantages of each one!
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!