1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sphinxa [80]
3 years ago
7

The Gramm-Leach-Bliley Act contains a rule that ensures security and confidentiality of customer information, protects against a

nticipated threats or hazards to security or integrity of information, and protects against unauthorized access to or use of the customer information. What is this rule called
Computers and Technology
2 answers:
ValentinkaMS [17]3 years ago
7 0

Answer:

b. The Safeguards Rule

Explanation:

According to a different source, these are the options that come with this question:

a. The Information Assurance Rule

b. The Safeguards Rule

c. The Safety Rule

d. The Guardian Rule

This rule is called the <em>Safeguards Rule</em>, and it comes from the Gramm–Leach–Bliley Act (GLBA), also known as the Financial Services Modernization Act of 1999. This is an act of Congress signed by President Bill Clinton that removed barriers among banking companies, securities companies and insurance companies. This meant that organizations such as commercial banks, investment banks, securities firms, and insurance companies were able to consolidate.

ryzh [129]3 years ago
4 0

Answer:

THE SAFEGUARDS RULE.

Explanation:

The Safeguards Rule requires financial institutions under FTC (financial trade commission) jurisdiction to have measures in place to keep customer information secure. In addition to developing their own safeguards, companies covered by the rule are responsible for taking steps to ensure that their affiliates and service providers safeguard customer information in their care.

The rule requires financial institutions to develop, implement, and maintain a comprehensive information security program. The implementations made by financial institutions protect against threats and unauthorized access or use of customer informations.

Therefore, the rule in Gramm-Leach-Bliley Act that ensures security and confidentiality of customer information, protects against anticipated threats or hazards to security or integrity of information, and protects against unauthorized access to or use of the customer information is called THE SAFEGUARDS RULE.

You might be interested in
If the ____________ is broken on a laptop, chances are other parts are also broken.
ella [17]
Central processing Unit
8 0
3 years ago
"The number of hardware chips needed for multiple digit display can be minimized by using the technique called ________"
Dafna1 [17]

Answer: Multiplexing

Explanation:

By using the multiplexing technique we can easily use the multiple digit display in the input pins of the hardware. We can use this technique to display the several digits and the extra hardware is require which is proportional to the number of several digit to be display.

As, hardware use only limited number of input and output pins. Therefore, multiplexing is the technique used the number of hardware chips need for multiple digit display and can be minimize using this technique.

 

4 0
3 years ago
Suppose that a queue is implemented using a circular array of size 12. What is the value of last after the following operations?
otez555 [7]

Answer:

10

Explanation:

An enqueue operation is a function that adds an element(value) to a queue array. A dequeue operations removes an element from a queue array. Queue arrays follow a first-in-first-out approach, so elements that are first stored in the queue are removed/accessed first(enqueue operations add elements at the rear of the queue array).

The following operations leave 10 elements in the queue of array size 12 after its done:

10 enqueue operations= adds 10 elements

5 dequeue operations= removes 5 elements( 5 elements left in queue)

6 enqueue operations= adds 6 elements(11 elements in queue)

10 dequeue operations= removes 10 elements(1 element left in queue)

8 enqueue operations= adds 8 elements(9 elements in queue)

2 dequeue operations= removes 2 elements(7 elements left in queue)

3 enqueue operations= adds 3 elements(10 elements in queue)

Therefore there are 10 elements in the queue after enqueue and dequeue operations.

8 0
3 years ago
You do not need to remove the lead weights inside tires before recycling them. A) TrueB) False
mel-nik [20]

Answer:

b you need to my dad is a car repair man and so am i

Explanation:

5 0
3 years ago
Question 55 :You use a computer named Wkst1 on a TCP/IP network, which is installed with an application that uses UDP to send a
liubo4ka [24]

Answer:

The protocol will drop the packets

The application will automatically re-transmit the packets

Explanation:

Based on design, the routers will drop the packets as allowed by the Internet Protocol, due to the collision that resulted from the router being busy and the network is congested or that the packet is corrupt as indicated by the check sequence of the Ethernet frame or the IPv4 header checksum

Given that the application uses User Datagram Protocol (UDP) which does not allow recovery of lost packets, but have their defined methods of overseeing lost packets, as such the application will re-transmit the packet.

4 0
3 years ago
Other questions:
  • Read the two sentences below. Then select the response that best describes the verb tense used in the sentences.
    5·1 answer
  • What term is used for a seemingly harmless program that has malicious code hidden inside?
    9·1 answer
  • Write a function named times_ten. the function should accept an argument and display the product of its argument multiplied time
    13·1 answer
  • An open system consists of nonproprietary hardware and software based on publicly known standards that allows third parties to c
    5·1 answer
  • Question #2
    6·2 answers
  • What do newly PivotTables look like?
    9·1 answer
  • What values can represent a bit
    8·1 answer
  • F
    9·1 answer
  • Creating a Numpy Array
    5·1 answer
  • Whats the flow in this code, and whats the risk that its creating and what can i do to fix it? (c language)
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!