1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nady [450]
3 years ago
8

Ciscon Telecom is a mobile operator in the European Union. The company provides personalized services to its customers, and its

databases contain valuable information about the customers. The loss of customer information that is used to decide services would be extremely harmful to the organization. Which of the following strategies adopted by Ciscon is an example of risk transference
A. The company insures any possible data loss for a large sum.
B. It installs a corporate firewall to protect unauthorized access to information.
C. The company forms a special team of top executives to monitor and correct the information policies.
D. The company decides to absorb any damages that might occur.
E. It enforces a strict employee data policy and prohibits employees from unauthorized access.
Computers and Technology
2 answers:
Dmitry [639]3 years ago
8 0

Answer:

A. The company insures any possible data loss for a large sum.

Explanation:

Risk transference is the transferring of risk to a third party. It shift the burden that arise from lose of data from one party to another party through legislation or contract agreement. It is a common risk management techniques.

In this question, Ciscon telecom would be transferring the risk of losing data to a third party.

LuckyWell [14K]3 years ago
7 0

Answer:

A. The company insures any possible data loss for a large sum.

Explanation:

Risk Transference  is a common risk management technique which involves shifting of the burden of loss for a risk to another party through legislation, contract, insurance or other means.

In the case loss of customer information that is used to decide services which would be extremely harmful to Ciscon,  Ciscon will need to insure any possible data loss for a large sum as an adopted strategy of risk transference.

You might be interested in
How would you convert this base 10 decimal into a base 2number?:
Tju [1.3M]

Answer:

The method of converting a base 10 or decimal number into base 2 or binary number is as following:-

  1. Divide the decimal number by 2 and store it's remainder.
  2. keep dividing the decimal number by 2 until it becomes 0 and also keep storing it's remainder.
  3. Then write the remainders in reverse order.This the binary number.

Refer the attached image for better explanation.

6 0
3 years ago
Random integer between 3 and 13 (inclusive)
garri49 [273]

Answer:

6

Explanation:

5 0
3 years ago
Read 2 more answers
Why is it important to stand clear and not touch the person while the AED is analyzing or defibrillating?
galben [10]

Answer:

Because you could also receive shock

Explanation:

Automatic external defibrillators can help save lives during sudden cardiac arrest.

Do not touch the person while the AED is analyzing; touching or moving the person can affect the analysis. You or another person could be injured by shock. And you could prevent the AED from analyzing your heart rate correctly.

5 0
3 years ago
Which term represents a computational instruction stored in computer memory? A. operator B. opcode C. operand D. command
STALIN [3.7K]

Answer:

B - Opcode

Explanation:

A computational instruction with operands is a command so computational instructions is just an opcode.

5 0
3 years ago
Read 2 more answers
"Cookies cannot reliably identify individual users." Which of the following is the reason for the statement shown above? Group o
Tresset [83]

Answer: Individual users use different browsers on the same computer to surf the Web.

Explanation:

Cookies are referred to as the text files that contains small pieces of data such as username and password which can be used in the identification of the computer of the user when the user uses a particular network.

The main reason why cookies cannot reliably identify individual users is due to the fact that individual users use different browsers on the same computer to surf the Web.

5 0
3 years ago
Other questions:
  • What component on a smartphone requires pairing with another device?
    8·1 answer
  • In Excel, what happens to the cell contents when you click and drag a cell into multiple cells?
    14·1 answer
  • Review the given requirements using the checklist and discover possible problems with them. The following requirements are for a
    8·1 answer
  • Wich technology can a website use to allow you to listen to a concert live over the internet?
    10·1 answer
  • Zachary was frustrated. His computer was running very slowly and he was worried that it was reducing his productivity on the job
    15·1 answer
  • Presently we can solve problem instances of size 30 in 1 minute using algorithm A, which is a algorithm. On the other hand, we w
    8·1 answer
  • Help please im not sure what this means T^T
    12·2 answers
  • Shooting phases in film and video editing​
    13·1 answer
  • Suppose that a disk drive has 5,000 cylinders, numbered 0 to 4,999. The drive is currently serving a request at cylinder 2,150,
    6·1 answer
  • What is a feature of Accenture’s myNav platform?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!