1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nady [450]
3 years ago
8

Ciscon Telecom is a mobile operator in the European Union. The company provides personalized services to its customers, and its

databases contain valuable information about the customers. The loss of customer information that is used to decide services would be extremely harmful to the organization. Which of the following strategies adopted by Ciscon is an example of risk transference
A. The company insures any possible data loss for a large sum.
B. It installs a corporate firewall to protect unauthorized access to information.
C. The company forms a special team of top executives to monitor and correct the information policies.
D. The company decides to absorb any damages that might occur.
E. It enforces a strict employee data policy and prohibits employees from unauthorized access.
Computers and Technology
2 answers:
Dmitry [639]3 years ago
8 0

Answer:

A. The company insures any possible data loss for a large sum.

Explanation:

Risk transference is the transferring of risk to a third party. It shift the burden that arise from lose of data from one party to another party through legislation or contract agreement. It is a common risk management techniques.

In this question, Ciscon telecom would be transferring the risk of losing data to a third party.

LuckyWell [14K]3 years ago
7 0

Answer:

A. The company insures any possible data loss for a large sum.

Explanation:

Risk Transference  is a common risk management technique which involves shifting of the burden of loss for a risk to another party through legislation, contract, insurance or other means.

In the case loss of customer information that is used to decide services which would be extremely harmful to Ciscon,  Ciscon will need to insure any possible data loss for a large sum as an adopted strategy of risk transference.

You might be interested in
Which part of project management considers if employees will work at home or in the office?
gregori [183]

Answer: i think its resources

Explanation:

5 0
2 years ago
Read 2 more answers
ZeroIt is a function that takes one argument and returns no value. The argument is a pointer to int. The function stores the val
Sedbober [7]

Answer:

zeroIt(&x);

Explanation:

The statement that sets the value stored in x to zero by invoking the function zerolt is given below

zeroIt(&x);

The zeroIt function is also given below for better understanding.

void zeroIt(int *x) {

   *x = 0;

}

As seen, the function takes an argument with integer variable type, which is a pointer, denoted by the asterisk symbol (*x).

The ampersan sign (&x) is used to access the variable whose value can then be stored.

7 0
3 years ago
What is a system analyst?
Novosadov [1.4K]

Answer:

A system analyst is a profession where someone researches and explores about different technological systems.

Explanation:

Hope this helps!

4 0
3 years ago
(asking again because point-hogs exist)
yawa3891 [41]

The answer is 2-to-the-power-of-n, since for every input, the number of different combinations doubles. From your list I think answer A is meant to indicate 2ⁿ.

6 0
2 years ago
What is a gamer?
mixer [17]

Answer:

It is <em>definitely </em>D.

Explanation:

I am a gamer myself so this question is easy for me. It's slim to none to be wrong when you view my answer!!!

7 0
2 years ago
Other questions:
  • 6.67
    5·1 answer
  • If a user wants to change one small section of the formatting of a document and leave the rest the same, which process should be
    14·1 answer
  • I NEED HELP NOW PLEASE!!!!!!
    6·2 answers
  • Jason is creating a web page for his school's basketball team. He just finished creating his storyboard. Which tool should he us
    6·2 answers
  • A technician is configuring a new SOHO multifunction wireless router at a customer’s location to provide network access to sever
    12·1 answer
  • For this project you will write a Java program that will run a simple math quiz. Your program will generate two random integers
    15·1 answer
  • A security administrator plans to conduct a vulnerability scan on the network to determine if system applications are up to date
    15·1 answer
  • The most common types of effects include entrances and exits
    11·1 answer
  • Insert in the Current Values section at the top of the worksheet summary functions that use the range I9:I54. In cell I2, calcul
    7·1 answer
  • Tom wants to find a number so that the sum of the digits of a two-digit number is 7. When reversing the digits, the number shoul
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!