1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BaLLatris [955]
3 years ago
5

An organization has a datacenter manned 24 hours a day that processes highly sensitive information. The datacenter includes emai

l servers, and administrators purge email older than six months to comply with the organization's security policy. Access to the datacenter is controlled, and all systems that process sensitive information are marked. Administrators routinely back up data processed in the datacenter. They keep a copy of the backups on site and send an unmarked copy to one of the company warehouses. Warehouse workers organize the media by date, and they have backups from the last 20 years. Employees work at the warehouse during the day and lock it when they leave at night and over the weekends. Recently a theft at the warehouse resulted in the loss of all of the offsite backup tapes. Later, copies of their data, including sensitive emails from years ago, began appearing on Internet sites, exposing the organization's internal sensitive data.
Of the following choices, what would have prevented this loss without sacrificing security?
A. Mark the media kept offsite.
B. Don't store data offsite.
C. Destroy the backups offsite.
D. Use a secure offsite storage facility.
Computers and Technology
1 answer:
larisa86 [58]3 years ago
8 0

Answer:

The answer is D.

Explanation:

Upon examining the example that is given in the question, it is clear that storing the copies of the data at a warehouse which has no security at nights and on the weekends is a poor decision and it is what caused this problem.

Backups from the last 20 years is serious security risk and a liability to the company if they were to be exposed so they should have been more careful about this and stored the data at a secure offsite storage where there is security 24/7 and there is no possibility of theft which would have prevented this from happening.

I hope this answer helps.

You might be interested in
Alicia is a dietitian. She gives other people suggestions for nutrition. She wants to organize a large amount of data concerning
stepladder [879]
A.word processor
------------------------

5 0
4 years ago
Read 2 more answers
How are computers connected to one another?
sergeinik [125]

Answer:

They are connected through networks

Explanation:

N/A

7 0
3 years ago
Read 2 more answers
____ are the computers that store network software and shared or private user files.
kodGreya [7K]
Servers <span>are the computers that store network software and shared or private user files.</span>
3 0
4 years ago
HELP ME PLEASE
MAXImum [283]

Explanation:

Threats

Computer Security Threats are possible dangers that can affect the smooth functioning of your PC. These may be a small piece of adware or a harmful Trojan malware. In the present age, computer security threats are constantly increasing as the world is going digital. computer security threats

Types of Computer Security Threats

There are several types of computer security threats such as Trojans, Virus, Adware, Malware, Rootkit, hackers and much more. Check some of the most harmful types of computer Security Threats.

COMPUTER VIRUS

A Computer Virus is a malicious program, which replicates itself and infects the files and programs of your PC and can make them non-functional.

COMPUTER WORMS

A self-replicating computer program that spreads malicious codes, computer worms make use of the network to send copies of the original codes to other PCS. It can also go to the extent of sending transferring documents utilizing the email of the user.

SCAREWARE

Scareware is a malware that tricks victims to buy software by displaying fake virus alerts. A scareware infected PC may get pop-ups of fake malware threats and to get rid of those, users are prompted to purchase a fake anti-malware software.

KEYLOGGER

Also known as a keystroke logger, Keyloggers can track the real-time activity of a user on his computer. Keylogger runs in the background and records all keystrokes made by a user and passes the information to the hacker with the motive to steal password and banking details.

ROOTKIT

A rootkit is considered extremely dangerous as they appear to be legitimate files and deceives the computer user. Rootkit masks viruses and worms and makes them appear as necessary files. These are very difficult to remove and only an antivirus with the anti-rootkit feature can remove a rootkit.

Tips for Best Computer Security

For best computer security, you must follow certain guidelines, which are also called computer best practices. 1. Use the best antivirus software, which not only provides protection to your PC but also internet protection and guards against cyber threats. 2. Do not download untrusted email attachments and these may carry harmful malware. 3. Never download software from unreliable sites as they may come with a virus that may infect your system as soon as you install the software.

4 0
2 years ago
The shortcut key combination to cut text is. Ctrl+C Ctrl+X Shift+V Shift+Y​
Gemiola [76]

Answer:

Ctrl + X

Explanation:

5 0
4 years ago
Read 2 more answers
Other questions:
  • How can i put this sign in my keybord?<br><br> :::::<br> ^<br> Here is the sign
    8·1 answer
  • If you see an icon in a document preset that looks like a tiny web browser window, what type of document is the preset meant to
    13·1 answer
  • Phoebe has to give a permission about recycling. Where should she look while presenting?
    11·1 answer
  • Software companies will often release a(n) ___ version to a limited audience that will test it on their systems. Programmers can
    11·1 answer
  • Wow, in this century, technology have been the most valuable. What is the worst of using the hi-tech phones
    13·2 answers
  • Why do designers use tonal shading?
    10·2 answers
  • UDAL Pretest: Using Digital Cameras 15 Select the correct answer. Which mode of shutter speed helps to capture creative effects
    6·1 answer
  • Why must a mobile application be easily customized and personalized?
    14·2 answers
  • What is payload?
    8·1 answer
  • How to mark a discussion as read on canvas dashboard.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!