1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vanyuwa [196]
3 years ago
9

Rosseta Technologies, an information technology service provider to a company based out of Germany, allows its employees to work

from home twice a month. Its major concern is the leakage of confidential data from the laptops or an employee making copies of sensitive files on his personal laptop. Which of the following would help the firm enforce access controls and storage guidelines on its laptops?
a. Anenterprise search software
b. A binary search tool
c. A perceptive software pack
d. A Domain search engine
Computers and Technology
1 answer:
Stella [2.4K]3 years ago
6 0

Answer:

a. An enterprise search software.

Explanation:

In this scenario, Rosseta Technologies, an information technology service provider to a company based out of Germany, allows its employees to work from home twice a month. In order to prevent the leakage of confidential data from the laptops or an employee making copies of sensitive files on his personal laptop, Rosetta technologies should use an enterprise search software.

Enterprise search software is a computer application which is typically used to make relevant data from sources, such as a database, file system and intranet searchable to a specific or defined group of people.

An enterprise search software would help the firm enforce access controls and storage guidelines on its laptops.

On enterprise search software, there are basically two (2) ways to enforce access controls as a security policy on users;

1. Early binding: at the index stage, permissions are analyzed and ascribed to each document in the enterprise search software.

2. Late binding: it involves the process of analyzing permissions and ascribing them to each document at the query stage in the enterprise search software.

You might be interested in
Imagine that you need to be late to work next Thursday because of a doctor's appointment. Compose your own e-mail appropriate fo
ratelena [41]
In form your boss a week early
8 0
3 years ago
I was logging into my origin account and this popped up. I can’t seem to click the NEXT button at the bottom. The blank spaces s
Valentin [98]

Answer:

Contact the company to find out what the problem is.

Explanation:

3 0
3 years ago
Read 2 more answers
Something the user knows (ID and password); something the user has (such as a smart card, which is a credit card device storing
Vlad1618 [11]

Answer:

Secure Authentication involves a combination of the following three information

Explanation:

Generally, it is important that users have access to secure sources of information or data. These data will be used by the users to get access to their platform such as account details. The user should also be the only person that has access to his or her vital information. This should not be disclosed to any other person.

8 0
4 years ago
Matts has finished running some security automation scripts on three newly deployed Linux servers. After applying intrusion dete
gizmo_the_mogwai [7]

Answer: CPU

Explanation:

The management dashboard refers to the tool that's used in the presentation of the vital k management KPIs in a single place, which is efficiently managed in order to make faster and better decisions.

Based on the information given, after the application of intrusion detection, virus, and malware protection on the Linux images, he will notices an increase in CPU on his server management dashboard.

Therefore, the correct option is C.

5 0
3 years ago
Which type of chart is preferable when you are dealing with a timeframe?
ANTONII [103]

Answer:

Pie chart

Explanation:

Just get to know

7 0
3 years ago
Other questions:
  • Which cloud computing service model gives software developers access to multiple operating systems for testing?
    5·1 answer
  • Which organization publishes a handbook that describes various occupations?
    12·1 answer
  • Describe the Sign in process of an Email account.​
    6·1 answer
  • The most common solution to supply chain uncertainties is to build inventories or __________ as insurance.
    6·1 answer
  • Which of the following information should be included in audit documentation? a. Procedures performed. b. Audit evidence examine
    13·1 answer
  • Consider the problem of solving two 8-puzzles.
    10·1 answer
  • Compared to other forms of communication, texting does not offer as many message cues.
    13·1 answer
  • HURRY!!!!!!!!!!!!!
    15·1 answer
  • Which of the following are the dimensions of feasibility? Group of answer choices cost, schedule, technical, and organizational
    14·1 answer
  • What is a cloud in the world of computing
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!