Question

Which of the following is the best way to protect information assets? A) limit the number...

Which of the following is the best way to protect information assets?

A) limit the number of users that can access the data at the same time to 5 people

B) Implement policies and procedures for data deletion (destruction)

C) limit the amount of time a user may access the data

D) Require an ID and Password to access the data in the database

Homework Answers

Answer #1

Ans:

D) Require an ID and Password to access the data in the database is Correct Answer

Explanation:

In order to Protect the Information assets every user on computer must have user id and password in order to protect the information system assets which help identifying those persons who breaches the confidentiality, integrity, availability so that it help to detect the unauthorised usage and detecting the violators and thereby protect the information system assets and resources.

Hope this helped ! Let me know in case of any queries.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Provide the following: A list of two functional requirements. A list of two nonfunctional requirements (must...
Provide the following: A list of two functional requirements. A list of two nonfunctional requirements (must be measurable). A list of two design constraints. Saleem Application[1] Health is the most valuable possession for a human.Therefore, health must be cared about by all means. Good food, physical exercise and enough sleep are keys to good health. Another important factor is fitness. Fitness is a condition of being physically active. It is a result of general nutrition and proper conditioning, and it...
Choice question: Which of the following best describes critical theorists’ views on disclosure of social responsibility...
Choice question: Which of the following best describes critical theorists’ views on disclosure of social responsibility information? Corporate social reporting may be beneficial because it gives the impression of concern and change but in fact, will do no more than allow the system to “capture” the radical elements of, for example, socialism, environmentalism or feminism and thus emasculate them. The disclosure of corporate social responsibility information acts to legitimise, and challenge, those providing the information. Greater disclosure of social responsibility...
The purposes of this article, capital assets are defined as tangible or intangible assets that are...
The purposes of this article, capital assets are defined as tangible or intangible assets that are used in operations and that have useful lives of more than one year, such as land and improvements to land, buildings and building improvements; vehicles; machinery; equipment; and sewer, water and highway infrastructures. Risk Assessment: A municipality’s capital assets are subject to a number of risks. Local officials must be cognizant of these risks as they seek to effectively manage their municipality’s capital assets....
In today’s mobile, cloud-first world, organizations are allowing unprecedented levels of work to be completed from...
In today’s mobile, cloud-first world, organizations are allowing unprecedented levels of work to be completed from outside of the office. Employees and employers both benefit from the flexibility and efficiency that arises when workers can perform their duties from coffee shops, airports, their homes, and more. As such, providing employees with the ability to work remotely is an excellent way to attract and retain a talented, productive team. The devices and security measures used throughout an organization play a significant...
Government is cleaning up the way companies do business after accounting and governance scandals rocked investor...
Government is cleaning up the way companies do business after accounting and governance scandals rocked investor confidence and damaged the reputation of companies large and small. The Sarbanes-Oxley Act (SOX) of 2002 was enacted in response to the high-profile Enron and World Com financial scandals to protect shareholders and the public from accounting errors and fraudulent practices by organizations. One primary component of the SOX is the definition of which records are to be stored and for how long. For...
QUESTION 1 Advanced Security Inc. was hired by the Treasury Bank Inc. for securing their systems....
QUESTION 1 Advanced Security Inc. was hired by the Treasury Bank Inc. for securing their systems. The first thing they did was implement the best practice if separation of domains. As a result of this The bank had to get a new domain name. any change made in the records points to only one party who could have made that change. If you are a technical person, you must have office in a particular area of the building. accessing outside...
Summarize the article and answer the following questions in your answer: 1. What specific metrics are...
Summarize the article and answer the following questions in your answer: 1. What specific metrics are being used? 2. What value is the company getting from using this data? Over the past three-plus weeks, the situation has snowballed. Facebook CEO Mark Zuckerberg was in Washington this week to testify before Congress. Meanwhile, the number of accounts affected has risen to 87 million from initial reports of 50 million. Separately, Facebook said it was purging pages linked to a Russian troll...
1) Which of the following is not a valid way that a CRM system can collect...
1) Which of the following is not a valid way that a CRM system can collect information? A. accounting system B. order fulfillment system C. inventory system D. customer’s personal computer 2)Which of the following is a common marketing CRM metric? A. number of new prospective customers B. average number of service calls per day C. average time to resolution D. cost per interaction by marketing campaign 3)Which question below represents a CRM reporting technology example? A. Why did sales...
With reference reference to our Session 2 Case Study (Facebook and Google) respond to the following...
With reference reference to our Session 2 Case Study (Facebook and Google) respond to the following question: 1. Do people who use Facebook have a legitimate claim to privacy when they themselves are posting information about themselves? Explain your position. 2. What ethical, social, and political issues exist? Briefly explain your response. CASE In a 2010 interview, Mark Zuckerberg, the founder of Facebook, proclaimed that the “age of privacy” had to come to an end. According to Zuckerberg, social norms...
You have recently been hired by a new Japanese accounting firm, headquarter in Tokyo, as the...
You have recently been hired by a new Japanese accounting firm, headquarter in Tokyo, as the director of Information Systems and Telecommunications. Your assignment is to assist security posture of the firm and develop a security structure for this new company. Write your recommendations and reasons to the firm’s CEO. The firm has 600 employees in Tokyo, 50 in Houston, and is planning to open two branch offices in India and California. Ten accountants will be hired at each site....