1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nady [450]
3 years ago
8

Ciscon Telecom is a mobile operator in the European Union. The company provides personalized services to its customers, and its

databases contain valuable information about the customers. The loss of customer information that is used to decide services would be extremely harmful to the organization. Which of the following strategies adopted by Ciscon is an example of risk transference
A. The company insures any possible data loss for a large sum.
B. It installs a corporate firewall to protect unauthorized access to information.
C. The company forms a special team of top executives to monitor and correct the information policies.
D. The company decides to absorb any damages that might occur.
E. It enforces a strict employee data policy and prohibits employees from unauthorized access.
Computers and Technology
2 answers:
Dmitry [639]3 years ago
8 0

Answer:

A. The company insures any possible data loss for a large sum.

Explanation:

Risk transference is the transferring of risk to a third party. It shift the burden that arise from lose of data from one party to another party through legislation or contract agreement. It is a common risk management techniques.

In this question, Ciscon telecom would be transferring the risk of losing data to a third party.

LuckyWell [14K]3 years ago
7 0

Answer:

A. The company insures any possible data loss for a large sum.

Explanation:

Risk Transference  is a common risk management technique which involves shifting of the burden of loss for a risk to another party through legislation, contract, insurance or other means.

In the case loss of customer information that is used to decide services which would be extremely harmful to Ciscon,  Ciscon will need to insure any possible data loss for a large sum as an adopted strategy of risk transference.

You might be interested in
Write a Python program that has subprograms nested four deep and in which each nested subprogram references local variables, var
Juliette [100K]

Answer:

Check the explanation

Explanation:

CODE:

global_var = "global" #accessible to all functions

def level0():

level0_var = "level 0" #accessible to level 0,1,2,3

print();

print("Level 0 function:")

print("global variable: ",global_var)

print("local variable 0: ",level0_var)

def level1():

print();

print("Level 1 function:")

level1_var = "level 1" ##accessible to level 1,2,3

print("global variable: ",global_var)

print("local variable 0: ",level0_var)

print("local variable 1: ",level1_var)

def level2():

print();

print("Level 2 function:")

level2_var = "level 2" #accessible to level 2,3

print("global variable: ",global_var)

print("local variable 0: ",level0_var)

print("local variable 1: ",level1_var)

print("local variable 2: ",level2_var)

def level3():

print();

print("Level 3 function:")

level3_var = "level 3" #accessible to level 3

print("global variable: ",global_var)

print("local variable 0: ",level0_var)

print("local variable 1: ",level1_var)

print("local variable 2: ",level2_var)

print("local variable 3: ",level3_var)

level3()

level2()

level1()

level0()

Kindly check the attached image below to see the output  (indentations are important):

6 0
4 years ago
Which teamwork characteristic motivates your team members to perform better?
scoundrel [369]
Maybe Encouragement? I don't know, are there any choices to choose from?
4 0
3 years ago
Read 2 more answers
In early PCs, a DIMM in any one of the DIMM slots could fill the 64-bit bus; therefore, each slot was called a(n) ______________
Svetach [21]

Answer:

The correct answer to the following question will be Option A (Bank).

Explanation:

  • Sometimes on a motherboard, the memory modules are grouped into different groups and that each group is named as a branch. Furthermore, the term "bank" may be used loosely to describe a basic computing data storage area. When the record is stored in the database it can be accessed at a specific time by the user.
  • Because the 486 is a 32-bit processor and a 30-pin SIMM is 8-bit, four SIMMs (8x4=32) is called a bank when installing memory on an 80486 processor computer; Install four 16 MB SIMMs when upgrading to 64 MB. 

Therefore, Option A is the right answer.

3 0
3 years ago
By applying styles, _______ formats are being applied each time. A. various B. different C. the same D. similar
Dmitry [639]
I just took the test on (PF) it's C. the same

i hope this helped someone.
;-)
4 0
4 years ago
Read 2 more answers
What is the best free game designing program for windows
Nadusha1986 [10]
Python, Unity 3D, C++Notepad
8 0
3 years ago
Other questions:
  • What decimal number does the bit pattern 0×0c000000 represent if it is a two's complement integer?
    5·1 answer
  • What are the texture of metamorphic​
    12·1 answer
  • What is the real meaning of hack and crack?
    6·1 answer
  • Write a program that reads three numbers and print the largest one step by step answer
    9·1 answer
  • Which are emotional effects of anxiety? Check all that apply.
    10·2 answers
  • We piped the results of the Get-Process cmdlet to the Sort-Object cmdlet to sort them in descending order. Which property was us
    9·1 answer
  • Question #2
    7·1 answer
  • __________ may be defined as the application of methods and means to ensure that test results are reliable and valid, and errors
    11·1 answer
  • Mary wants to send a message to Sam in such a way that only Sam can read it. Which key should be used to encrypt the message
    9·1 answer
  • How is a transaction verified on a cryptocurrency network?.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!