1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OverLord2011 [107]
3 years ago
12

An organization has a datacenter that processes highly sensitive information and is staffed 24 hours a day. The datacenter inclu

des email servers, and administrators purge email older than six months to comply with the organization's security policy. Access to the datacenter is controlled, and all systems that process sensitive information are marked. Administrators routinely back up data processed in the datacenter. They keep a copy of the backups on site and send an unmarked copy to one of the company warehouses. Warehouse workers organize the media by date, and they have backups from the last 20 years. Employees work at the warehouse during the day and lock it when they leave at night and over the weekends. Recently a theft at the warehouse resulted in the loss of all of the offsite backup tapes. Later, copies of their data, including sensitive emails from years ago, began appearing on internet sites, exposing the organization's internal sensitive data. Which of the following administrator actions might have prevented this incident?
A. Mark the tapes before sending them to the warehouse.
B. Purge the tapes before backing up data to them.
C. Degauss the tapes before backing up data to them.
D. Add the tapes to an asset management database.
Computers and Technology
1 answer:
Sergeu [11.5K]3 years ago
3 0

Answer:

A. Mark the tapes before sending them to the warehouse.

Explanation:

If they had marked the tapes as sensitive information before sending them to the warehouses, it would have been easier for the people to go and store them properly, and not having them as easily robbed, they could have put them into safes, in order to prevent that when a theft entered would steal it.

You might be interested in
A user reports that he can't connect to a specific website. you go to the user's computer and reproduce the problem. what should
Inessa05 [86]
I would check that DNS is working, and then check that the returned address accepts connections properly.
3 0
3 years ago
Which is the least technically experienced technical support group?
Nezavi [6.7K]

Answer:

Tier 1 support

Explanation:

Of the given options, tier 1 support technical group is the least experienced group. This group of technicians is also referred to as level 1 technical group.

The tier 1 or level support are made up of junior technician, and they have few technical understandings.

Their roles include email response and basic troubleshooting, attending to phone calls, among others.

When a problem cannot be solved by tier 1 support  technicians, they pass the problem to tier 2 support technicians,  

5 0
3 years ago
Fitbit is an example of....
strojnjashka [21]

Answer:

a monitor of ur heartbeat sleep breathing

Explanation:

3 0
4 years ago
Read 2 more answers
A mule deer can run 1/4 mile in 25 seconds. Which of the following correctly shows this rate as miles per hour?
sashaice [31]
You would do 1/4 * 2.4, since 25 goes into 60 2.4 times so the answer would be 60 mph
8 1
3 years ago
Consider the scenario below. Will the solution attempted by the technician fix the problem or make it worse? Defend your answer.
PSYCHO15rus [73]

Answer:

Answer is depend on situation.

Explanation: If data stored on individual computer not using server ,answer will be  To fix the problem, the technician installed new, larger hard drives on all the computers. But most the time if many computer in the network ,they have to share data and will need server to share data, Over 20 pc in the network can not use standard pc for share files need to have server so,need more info to provide proper answer

i hope i help you

4 0
3 years ago
Other questions:
  • Repetition learning rates are the same for everyone, so there is no need to find an activation and break pattern that works
    12·2 answers
  • When creating wireframe geometry and the autocursor is on what happens when you push the shift key?
    13·1 answer
  • In a relational database, the three basic operations used to develop useful sets of data are:
    10·1 answer
  • What is the purpose of citations?
    13·1 answer
  • What was the first message ever sent in morse code?
    13·1 answer
  • Which statement is true about the purpose of a work in process constraint?
    15·1 answer
  • The declaration of variables begins with a command a. dim b. rem c. const​
    8·1 answer
  • Spoderman memes<br> im scared-
    15·2 answers
  • Choose all items that are true about the two example of HTML shown on the right.
    5·2 answers
  • What is a common misconception about Agile and DevOps?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!