1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nady [450]
3 years ago
8

Ciscon Telecom is a mobile operator in the European Union. The company provides personalized services to its customers, and its

databases contain valuable information about the customers. The loss of customer information that is used to decide services would be extremely harmful to the organization. Which of the following strategies adopted by Ciscon is an example of risk transference
A. The company insures any possible data loss for a large sum.
B. It installs a corporate firewall to protect unauthorized access to information.
C. The company forms a special team of top executives to monitor and correct the information policies.
D. The company decides to absorb any damages that might occur.
E. It enforces a strict employee data policy and prohibits employees from unauthorized access.
Computers and Technology
2 answers:
Dmitry [639]3 years ago
8 0

Answer:

A. The company insures any possible data loss for a large sum.

Explanation:

Risk transference is the transferring of risk to a third party. It shift the burden that arise from lose of data from one party to another party through legislation or contract agreement. It is a common risk management techniques.

In this question, Ciscon telecom would be transferring the risk of losing data to a third party.

LuckyWell [14K]3 years ago
7 0

Answer:

A. The company insures any possible data loss for a large sum.

Explanation:

Risk Transference  is a common risk management technique which involves shifting of the burden of loss for a risk to another party through legislation, contract, insurance or other means.

In the case loss of customer information that is used to decide services which would be extremely harmful to Ciscon,  Ciscon will need to insure any possible data loss for a large sum as an adopted strategy of risk transference.

You might be interested in
The Apple iPhone was a revolutionary product when it was introduced in 2007. To what extent do you agree or disagree with this s
DerKrebs [107]

Answer:

below

Explanation:

I agree

7 0
2 years ago
Page Setup options are important for printing a PowerPoint presentation a certain way. The button for the Page Setup dialog box
FrozenT [24]

Answer: Design tab

Explanation:

The page setup simply refers to the parameters which are defined by a particular user which is vital in knowing how a printed page will appear. It allows user to customize the page layout. The parameters include size, page orientation, quality of print,margin etc.

It should be noted that page setup options are vital for printing a PowerPoint presentation in a certain way and the button for the Page Setup dialog box can be found in the design tab.

4 0
2 years ago
Where do you access the status report of an assigned task that is open?
Marina86 [1]

Answer:

I forgot give me time to think abt it cuh

Explanation:

4 0
3 years ago
Read 2 more answers
True/False: Audio menus can be useful when one's hands and eyes are busy, or to assist vision-impaired users. With audio menus,
Aloiza [94]

Answer:

I believe the answer is true

5 0
3 years ago
Use the drop-down menus to complete statements about the Quick Steps function.
Sloan [31]

Answer:

  1. pray the god for your answer

Explanation:

I lllllllllllllll believe the Jesus

7 0
2 years ago
Other questions:
  • Write a function called ReverseLetters that takes an input phrase consisting of a single word and reverses the sequence of lette
    15·1 answer
  • When looking through the documentation for a specific class, you never actually see the source code for that class. Instead, you
    6·1 answer
  • Which of the following would be considered a strong password?
    5·2 answers
  • Given a scanner reference variable named input that has been associated with an input source consisting of a sequence of integer
    14·2 answers
  • Exploring Arraylists. Remember that arraylists are good for adding and removing things, and that they are clock-cycle friendlier
    13·1 answer
  • The instructions for a computer program are sometimes referred to as . computer programmers focus on computer programs, but they
    5·2 answers
  • Kris is the project manager for a large software company. Which part of project management describes the overall project in deta
    11·2 answers
  • What function is used to return the results in column D?
    11·1 answer
  • Modern helps to convert analog signal into digital and vice verse. true of false​
    12·1 answer
  • When would it be appropriate to run MS Office or Adobe on the Windows OS server ?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!