subject

An organization has a datacenter that processes highly sensitive information and is staffed 24 hours a day. the datacenter includes email servers, and administrators purge email older than six months to comply with the organization's security policy. access to the datacenter is controlled, and all systems that process sensitive information are marked. administrators routinely back up data processed in the datacenter. they keep a copy of the backups on site and send an unmarked copy to one of the company warehouses. warehouse workers organize the media by date, and they have backups from the last 20 years. employees work at the warehouse during the day and lock it when they leave at night and over the weekends. recently a theft at the warehouse resulted in the loss of all of the offsite backup tapes. later, copies of their data, including sensitive emails from years ago, began appearing on internet sites, exposing the organization's internal sensitive data. which of the following administrator actions might have prevented this incident?
a. mark the tapes before sending them to the warehouse.
b. purge the tapes before backing up data to them.
c. degauss the tapes before backing up data to them.
d. add the tapes to an asset management database.

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 09:00
Which best describes the condition under which the unicode output is the same as plain text?
Answers: 3
question
Computers and Technology, 22.06.2019 22:40
Least square fit to polynomial write a function leastsquarefit3pol that solves a linear system of equations to find a least squares fit of a third order polynomial to an experimental data set given as two row arrays. the function leastsquarefit3pol must explicitly solve a set of linear equations and cannot use polyfit. there should be no restriction on the size of the problem that can be solved.
Answers: 1
question
Computers and Technology, 23.06.2019 06:30
To become an audio technician, the most successful tactics might include the following. (select all that apply). learning how to persuade other people gaining different types of experience in audio technology learning as much as possible about art history establishing a reputation as a reliable professional
Answers: 1
question
Computers and Technology, 23.06.2019 09:30
The place where the extended axis of the earth would touch the celestial sphere is called the celestial
Answers: 1
You know the right answer?
An organization has a datacenter that processes highly sensitive information and is staffed 24 hours...
Questions
Questions on the website: 13722361