Question

Which of the following is the best way to protect information assets? A) limit the number...

Which of the following is the best way to protect information assets?

A) limit the number of users that can access the data at the same time to 5 people

B) Implement policies and procedures for data deletion (destruction)

C) limit the amount of time a user may access the data

D) Require an ID and Password to access the data in the database

Homework Answers

Answer #1

Ans:

D) Require an ID and Password to access the data in the database is Correct Answer

Explanation:

In order to Protect the Information assets every user on computer must have user id and password in order to protect the information system assets which help identifying those persons who breaches the confidentiality, integrity, availability so that it help to detect the unauthorised usage and detecting the violators and thereby protect the information system assets and resources.

Hope this helped ! Let me know in case of any queries.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Choice question: Which of the following best describes critical theorists’ views on disclosure of social responsibility...
Choice question: Which of the following best describes critical theorists’ views on disclosure of social responsibility information? Corporate social reporting may be beneficial because it gives the impression of concern and change but in fact, will do no more than allow the system to “capture” the radical elements of, for example, socialism, environmentalism or feminism and thus emasculate them. The disclosure of corporate social responsibility information acts to legitimise, and challenge, those providing the information. Greater disclosure of social responsibility...
The purposes of this article, capital assets are defined as tangible or intangible assets that are...
The purposes of this article, capital assets are defined as tangible or intangible assets that are used in operations and that have useful lives of more than one year, such as land and improvements to land, buildings and building improvements; vehicles; machinery; equipment; and sewer, water and highway infrastructures. Risk Assessment: A municipality’s capital assets are subject to a number of risks. Local officials must be cognizant of these risks as they seek to effectively manage their municipality’s capital assets....
In today’s mobile, cloud-first world, organizations are allowing unprecedented levels of work to be completed from...
In today’s mobile, cloud-first world, organizations are allowing unprecedented levels of work to be completed from outside of the office. Employees and employers both benefit from the flexibility and efficiency that arises when workers can perform their duties from coffee shops, airports, their homes, and more. As such, providing employees with the ability to work remotely is an excellent way to attract and retain a talented, productive team. The devices and security measures used throughout an organization play a significant...
QUESTION 1 Advanced Security Inc. was hired by the Treasury Bank Inc. for securing their systems....
QUESTION 1 Advanced Security Inc. was hired by the Treasury Bank Inc. for securing their systems. The first thing they did was implement the best practice if separation of domains. As a result of this The bank had to get a new domain name. any change made in the records points to only one party who could have made that change. If you are a technical person, you must have office in a particular area of the building. accessing outside...
Government is cleaning up the way companies do business after accounting and governance scandals rocked investor...
Government is cleaning up the way companies do business after accounting and governance scandals rocked investor confidence and damaged the reputation of companies large and small. The Sarbanes-Oxley Act (SOX) of 2002 was enacted in response to the high-profile Enron and World Com financial scandals to protect shareholders and the public from accounting errors and fraudulent practices by organizations. One primary component of the SOX is the definition of which records are to be stored and for how long. For...
Summarize the article and answer the following questions in your answer: 1. What specific metrics are...
Summarize the article and answer the following questions in your answer: 1. What specific metrics are being used? 2. What value is the company getting from using this data? Over the past three-plus weeks, the situation has snowballed. Facebook CEO Mark Zuckerberg was in Washington this week to testify before Congress. Meanwhile, the number of accounts affected has risen to 87 million from initial reports of 50 million. Separately, Facebook said it was purging pages linked to a Russian troll...
With reference reference to our Session 2 Case Study (Facebook and Google) respond to the following...
With reference reference to our Session 2 Case Study (Facebook and Google) respond to the following question: 1. Do people who use Facebook have a legitimate claim to privacy when they themselves are posting information about themselves? Explain your position. 2. What ethical, social, and political issues exist? Briefly explain your response. CASE In a 2010 interview, Mark Zuckerberg, the founder of Facebook, proclaimed that the “age of privacy” had to come to an end. According to Zuckerberg, social norms...
You have recently been hired by a new Japanese accounting firm, headquarter in Tokyo, as the...
You have recently been hired by a new Japanese accounting firm, headquarter in Tokyo, as the director of Information Systems and Telecommunications. Your assignment is to assist security posture of the firm and develop a security structure for this new company. Write your recommendations and reasons to the firm’s CEO. The firm has 600 employees in Tokyo, 50 in Houston, and is planning to open two branch offices in India and California. Ten accountants will be hired at each site....
58. Question 58 Which three (3) of these are Solution Building Blocks (SBBs)? (Select 3) 1...
58. Question 58 Which three (3) of these are Solution Building Blocks (SBBs)? (Select 3) 1 point Virus Protection Identity and Access Management Spam Filter Application Firewall 59. Question 59 A robust cybersecurity defense includes contributions from 3 areas, human expertise, security analytics and artificial intelligence. Which of these areas would contain the ability for unstructured analysis? 1 point Human expertise Artificial intelligence Security analytics 60. Question 60 How would a SIEM flag a user who is trying to log...
SCENARIO: Imagine a fictional social media firm called ShareMe. ShareMe is similar to Facebook; it is...
SCENARIO: Imagine a fictional social media firm called ShareMe. ShareMe is similar to Facebook; it is an online, virtual meeting place for friends and family to share photos, videos, and messages. With increased social media competition in the marketplace, ShareMe is struggling to stay profitable. Many advertisers are refusing to renew their ShareMe contracts for the upcoming calendar year. ShareMe currently has 300 employees. If ShareMe does not increase revenue this upcoming year, the firm will have to layoff 100...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT