Which of the following is NOT a potential security issue with archiving systems?

A. Inadequate logging by the archiving software
B. Weak access controls on the archive servers leading to stolen data
C. Over reliance on a single form of media
D. Inability to retain inactive data for regulatory or organizational requirements


D
Explanation: Retaining inactive data for regulatory or organizational requirements is a key feature of archiving systems, not a security weakness.

Computer Science & Information Technology

You might also like to view...

Give an example of a schedule of consistent transactions that is not serializable but maintains the correctness of any integrity constraint that might conceivably be associated with the database.

What will be an ideal response?

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. Efficiency is lost in importing the entire package instead of importing the classes you use. 2. Every Java program automatically imports the java.util package. 3. The new line character is represented as ā€˜\nā€™. 4. The method printf is used the same way as the method println but has the added feature that allows you to add formatting instructions. 5. The printf method can be used to output multiple formatted values.

Computer Science & Information Technology

The Back Up Database command is available on ________ view under Save As

Fill in the blank(s) with correct word

Computer Science & Information Technology

The only way to change outline heading levels is by using the Outline Level button

Indicate whether the statement is true or false

Computer Science & Information Technology