1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fudgin [204]
2 years ago
6

A multinational organization that offers web-based services has datacenters that are located only in the United State; however,

a large number if its customers are in Australia, Europe, and China. Payments for services are managed by a third party in the United Kingdom that specializes in payment gateways. The management team is concerned the organization is not compliant with privacy laws that cover some of its customers. Which of the following frameworks should the management team follow?
a) Payment card industry data security standard
b) Cloud security alliance best practices
c) ISO/IEC 27032 Cybersecurity guidelines
d) General Data Protection Regulation
Computers and Technology
1 answer:
yaroslaw [1]2 years ago
5 0

Based on the provided information, the frameworks that  the management team should follow is  Payment card industry data security standard.

According to the question, we are to discuss about worries of the management team about how the organization is not compliant with privacy laws that cover some of its customers.

However, to solve the issues of the Payments for services, Payment card industry data security standard should be seek for and this will make the organization to be secured.

Therefore, option A is correct.

Learn more about management team at;

brainly.com/question/13171394

You might be interested in
You are the administrator for a network with a single Active Directory domain called westsim. All computer accounts reside in or
N76 [4]
Link a GPO to the Marketing OU. In the GPO, edit the Enable client-side targeting policy and specify the Marketing Computers group.

In the WSUS console, edit the options for Computers and specify Use Group Policy or registry settings on computers.

In the WSUS console, create a Marketing Computers group.
3 0
3 years ago
Signs that a listener is paying attention include:
Tomtit [17]
Eye contact, Taking notes, being quiet.I mean there is a lot of ways
6 0
3 years ago
Read 2 more answers
The true or false questions.<br><br> 1.egrep can accept multiple filenames as input arguments.
BlackZzzverrR [31]

Answer: True  

Explanation: yes, it is true that egrep can accept multiple filenames as input arguments for example egrep -r "text1/text2", so this will search in all the sub directories . E grep is also known as 'grep -E' which belongs to the group of grep function and we used egrep to separate multiple patterns for OR conditions. This is also very less time consuming if you are going to search multiple input arguments in multiple different logs at the same time.

5 0
3 years ago
Project managers used to be common only in the field of _____ technology.
NNADVOKAT [17]

Answer:

Information

Explanation:

Project managers used to be common only in the field of information technology.

3 0
3 years ago
If two classes combine some private data members and provides public member functions to access and manipulate those data member
egoroff_w [7]

Answer:

c. Using public member functions to access and manipulate the data members

Explanation:

In object oriented programming, abstraction is used in order to lessen the complexity and hiding non essential details about how a program is actually working in the background. In order to achieve abstraction, classes are defined in such a way that the data members are hidden and the member functions form public interface. The public member functions here are used to access and manipulate these hidden or private data members. So the use of public member functions shows the abstraction here. These members functions are public so they can be directly accessed and the hidden or private data members can be accessed indirectly with the help of these member functions. So internal details of the classes and its data members are hidden from the outside world. Thus abstraction used here ensures security of data members of two classes and protects them from any accidental alterations by other parts of program.

5 0
3 years ago
Other questions:
  • What would 128 kbps look like on a phone? i.e. 4g, 3g, 2g, etc
    9·1 answer
  • Which is the most important reason you should properly cite information that you obtain from an Internet search? Question 2 opti
    8·1 answer
  • What happens if you move unencrypted files into an encrypted folder?
    5·1 answer
  • Life can get busy and hectic but relationships matter what is an effective way to mending relationships that may have been negle
    9·1 answer
  • Exampels of semantic tags ?​
    7·1 answer
  • Dan works for an automobile company. He has designed a new model of a car based on an older version. Which technology can he use
    6·1 answer
  • failure of the _ cylinder will often result in sudden unexpected loss of the ability to stop the vehicle
    10·1 answer
  • Rewritable (write, erase, write again) is known as _______.
    7·1 answer
  • Which of the following is Microsoft Windows 10 virtualization technology?
    10·1 answer
  • Use HTML and CSS, create a web page for the table shown below. Please copy (and paste) your code from your text editor (Replit).
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!