1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KonstantinChe [14]
4 years ago
8

Legal counsel has notified the information security manager of a legal matter that will require the preservation of electronic r

ecords for 2000 sales force employees. Source records will be email, PC, network shares, and applications.
After all restrictions have been lifted, which of the following should the information manager review?

A. Data retention policy
B. Legal hold
C. Chain of custody
D. Scope statement
Computers and Technology
1 answer:
Ray Of Light [21]4 years ago
3 0

Answer: (B) Legal hold

Explanation:

As being a security director, the security director are approached to solidify a server that run the red hat enterprise server the 5.5.

The servers are being utilized as DNS (Dynamic host service) and the server time. This is not utilized as the database, print server and the web server. There is no particular remote associations with the server.

The window of the command will be given the root accessing. Then, it provide the associated by means of a protected shell with the access root in the system.

 

You might be interested in
What is the different between information and data
Vika [28.1K]
Data is an individual unit that contains raw materials which do not carry any specific meaning. Information is a group of data that collectively carries a logical meaning.
7 0
3 years ago
Explain in details the evolution of computers​
Colt1911 [192]

Answer:

Evolution of computer technology can be divided into five generations. First generation computer consisted of vacuum tubes and they were used from 1943-1958. ... Third generation (1966-1973) computer consisted of integrated circuits (IC) i.e. many transistors in single silicon chip.

<em><u> </u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em><em><u> </u></em><em><u>Mark as brilliant</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em><em><u>.</u></em><em><u> </u></em>

3 0
3 years ago
_____ involves identifying and controlling the functional and physical design characteristics of products and their support docu
slamgirl [31]

Answer:

The correct answer to the following question will be Option C (Configuration management).

Explanation:

  • A method of device engineering to create and maintain continuity of the functionality, operational and physical characteristics of software with its specifications, configuration and operating details across its existence.
  • You will gain profit from:

Decreased risk of interruptions and data leaks through accessibility and keeping track of adjustments to your devices by implementing configuration management.

The remaining three solutions will not be capable of performing these functions. Therefore, the correct answer is alternative C Configuration management.

5 0
3 years ago
Janet needs to flag a message for follow-up in Outlook. Which option is not a default?
kari74 [83]
Answer:

Explanation:

Today
5 0
3 years ago
Read 2 more answers
when a sender encrypts a message using their own private key, what security service is being provided to the recipient?
Rudik [331]

asymmetric encryption

4 0
3 years ago
Other questions:
  • Which of these decisions would u most likely make on ur own
    8·2 answers
  • The ________ is a consortium of organizations that develops web protocols and sets standards.
    7·1 answer
  • How has the Aswan High Dem had an adverse effect on human health?​
    11·1 answer
  • Mrs. Brown is a teacher at the elementary school. As the school year begins, she sends a couple of email messages to her student
    11·1 answer
  • What of the following is not a benefit of active listening
    8·2 answers
  • What is the name of the image window area that allows you to determine if a line is truly horizontal or vertical
    7·2 answers
  • Jason has decided to use his name on all the images to protect them from misuse. He has also decided to use the logo of his comp
    15·2 answers
  • Which of the following is NOT one of the three main ways to control a program when writing code?
    13·2 answers
  • Can someone help answer this. I'm on a time crisis rn and need to pass or I fail the class. There are games that cannot be descr
    15·1 answer
  • your organization has decided to use dhcp for ipv6. you want all windows 10 systems using ipv6 to get all of their tcp/ip inform
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!