1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotykmax [81]
3 years ago
6

Universal Containers maintains Job information in a Custom Object that contains sensitive information. The only users who should

be able to view and edit job records are the user who owns the record and all users in the Delivery profile.Which three platform sharing tools are required to support the above requirements? A. "Modify All" permission for Job Object on the Delivery Profile
B. "View All Data" profile permission on the Delivery Profile
C. Grant Access Using Hierarchy sharing setting on the Job Object set to false
D. Criteria-Based sharing rule for the Delivery Profile on the Job Object
E. Organization-Wide Default sharing setting of Private on the Job Object
Computers and Technology
1 answer:
Elenna [48]3 years ago
7 0

Answer:

C. Grant Access Using Hierarchy sharing setting on the Job Object set to false.

A. "Modify All" permission for Job Object on the Delivery Profile.

E. Organization-Wide Default sharing setting of Private on the Job Object.

Explanation:

In this example, we are dealing with sensitive information. We learn that because of this, the only users who should be able to view and edit job records are the user who owns the record and all users in the delivery profile. In order to protect the information, it is necessary to have an organization-wide default sharing setting of private. After this, we also need the "modify all" permission for job object on the delivery profile and the Grant Access Using Hierarchy sharing setting to be set to false.

You might be interested in
TRUE OR FALSE!!<br> Your location can be identified simply by turning on your cell phone..
Tasya [4]

Answer:

this is true

Explanation:

this is true because of the GPS location device built into your phone

3 0
3 years ago
Read 2 more answers
The statistically multiplexed wan technology that is specifically designed to carry multiple kinds of traffic (data and voice is
Flura [38]
To manage and organise multiple kinds of traffic, the wide area network statistically multiplexed technology that could be used would be the ATM. Also known as the asynchronous transfer mode, this type of connection using fixed cells in encoding data with regards to the situational traffic.
5 0
3 years ago
Progressive places its messages on local radio stations and in the yellow pages of the phone book. These communications are dire
Alexandra [31]

Answer: Receiver

Explanation:  

The receiver basically is used in the communication channel where the person decode its output and message in the form of useful data or information.

The main function of the receiver is to provide the path between the transmitter as an output and receiver as an input. The receiver basically process the received signal for recovering the proper message signal. It basically receive the input signal and covert it into useful data.

7 0
3 years ago
Why is it necessary to understand conflict of interest and how it could affect you at work​
Anastasy [175]

Answer:

Conflict of interest is a common issue in the workplace. Most of us have heard someone say, “It’s who you know, not what you know.” We have heard co-workers complain that a manager’s relative always gets the biggest raise or the best assignment. We might have seen colleagues accept gifts from potential vendors. Maybe a co-worker leaves work 20 minutes early every day so she can get to her second job. A supervisor may give a co-worker time off from work to do volunteer work or might allow employees to solicit donations and funds in the workplace, whether for the Girl Scouts or a local school function. Even though these situations are very different, they all fall under the heading of “conflict of interest.”

Explanation:are a clash that most often occurs between requirements and interests. Various types of conflicts of interest can occur because of the nature of relationships versus rules of organizations or federal and state laws. People can easily become biased (have an unfair preference) because of small things like friendship, food, or flattery, or they may be influenced to make a decision because of the potential to gain power, prestige, or money. Conflicts can occur when an individual makes or influences a decision and does so for some personal gain that may be unfair, unethical, or even illegal. The important part is what you do in each of those situations. Do you allow your family, friendship, financial, or inside knowledge affect your actions? If you do, you could be violating state statute and university policy.

In our work lives, we also have interests that could influence the way we do our jobs and the decisions we make. Even if we never act on them, there may be an appearance that a conflict of interest has influenced our decisions. Consider this example. Your supervisor is promoted to department director. His daughter-in-law is hired as a new supervisor within the college but is not reporting to him. Maybe the new supervisor is the best candidate for that position, and maybe the new department director had nothing to do with her hire. Even if this hire met all of the requirements under our Employment of Relatives policy, the situation appears suspicious and employees may think that something was unfair or unethical about her hire.

Transparency (being completely open and frank) becomes important when dealing with both actual and potentially perceived conflicts of interest. Perception happens when an individual observes something (behavior or activity) and comes to a conclusion. Perceiving a conflict of interest does not make it a conflict of interest. The true test of verifying whether a matter is just a potentially perceived conflict of interest, or an actual conflict of interest, is disclosure.

7 0
4 years ago
A DNS server on your client's network is receiving a large number of DNS queries from what appears to be a workstation on their
drek231 [11]

Answer:

The answer is reflective DNS attack

Explanation:

Reflective DNS Attack is used in many distributed DDoS attacks to knock down an internet pipe. The attack is divided in two stages: first  the attacker sends lots of requests to one  or more legitimate DNS servers  while using spoofed source IP of the target person, and then, in the second stage, the DNS server receiving the semi-legitimate requests replies to the spoofed IP, thereby unknowingly lauching an attack on the target computer with responses to requests never sent by the victim.

4 0
4 years ago
Other questions:
  • Most panoramic photography focuses on what subject?
    9·2 answers
  • What is an enterprise system
    14·2 answers
  • If num is an int which expression always evaluates to true if num holds an odd number
    15·1 answer
  • 50 POINTS PLEASE HELP MEEEEEEEEE!!!!!!
    6·2 answers
  • Answer the following questions based on your readings from Module 1. Describe a time when you or someone you observed showed a p
    9·1 answer
  • Name two living thing and nonliving thing that interact in an ecosystem
    10·1 answer
  • marianne needs to create a version of her slide presentation that does not include all the slides and will be used for a particu
    9·1 answer
  • 8.10 quiz edhesive A swap is: a variable used to find the smallest value in an array an algorithm used to find a value in an arr
    12·1 answer
  • In what ways can you modify the location of the neutral point?
    12·1 answer
  • Which term refers to a shorthand method for identifying network and host bits in an ip address?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!