When moving from an internally controlled environment to a fully outsourced infrastructure environment, such as cloud computing, it is MOST important to:

A. Implement mandatory access controls.
B. Ensure RAID 0 is implemented on servers.
C. Impose time of day restrictions across all services
D. Encrypt all confidential data.


Answer: D. Encrypt all confidential data.

Computer Science & Information Technology

You might also like to view...

Consider the following definition of an anomaly: An anomaly is an object that is unusually influential in the creation of a data model.

(a) Compare this definition to that of the standard model-based definition of an anomaly. (b) For what sizes of data sets (small, medium, or large) is this definition appropriate?

Computer Science & Information Technology

The goal of the ____ function is to ensure a reliable level of secure practice across the entire organization.

A. enterprise continuity B. data security C. digital forensics D. training and awareness

Computer Science & Information Technology

Use the th element to indicate a table column or row _____.

a. data b. heading c. summary d. caption

Computer Science & Information Technology

Word tables can perform simple calculations

Indicate whether the statement is true or false

Computer Science & Information Technology