The company that you work for has implemented the following security controls: • All workstations have the latest patches and antivirus, • All sensitive data is encrypted in transit. • Dual-factor user authentication is used. • A firewall at the edge of the network is implemented. What is missing from this security posture?

A. no local encryption
B. weak user authentication
C. insufficient edge control
D. exposure to viruses


A
Explanation: While transport encryption has been enabled, the sensitive data should also be encrypted on the hard drives as well.

Computer Science & Information Technology

You might also like to view...

Write a stub for the function whose declaration is given below. Do not write a program that calls this, just write the stub. Hint: This is very short.

``` double yield (double pressure, double density, double temp); // Precondition: pressure is newtons per square meter // density is in kilograms per cubic meter // temp is in degrees Celcius// Postcondition: Return value is the relative yield of // a chemical process.It is a number between 0 and 1. // 0 means no output and 1 means ideal yield. ```

Computer Science & Information Technology

What modifier key should you use in combination with the Selection tool to add a keyframe to a rubber band in the Timeline panel?

What will be an ideal response?

Computer Science & Information Technology

Case OL 6-1Susan is an editorial assistant at Q Magazine. She completes many different tasks for the Editor in Chief and must stay organized. She uses Outlook's features to help her manage tasks. Susan is responsible for setting up freelancers in the payroll system and for processing their invoices. Her boss asked her to keep track of all e-mail messages, meeting requests, and task requests related to each freelance writer, editor, and photographer. To record these actions in the journal, she should click the Journal Options button in the ____.

A. Navigation pane B. Address Book C. Outlook Options dialog box D. Untitled - Journal Entry window

Computer Science & Information Technology

Which of the following is a standard hypertext link that you can embed directly in the flow of your content by choosing the key terms and concepts you anticipate your users will want to follow?

A. internal B. external C. fragmented D. contextual

Computer Science & Information Technology