When moving from an internally controlled environment to a fully outsourced infrastructure environment, such as cloud computing, it is MOST important to:
A. Implement mandatory access controls.
B. Ensure RAID 0 is implemented on servers.
C. Impose time of day restrictions across all services
D. Encrypt all confidential data.
Answer: D. Encrypt all confidential data.
You might also like to view...
Consider the following definition of an anomaly: An anomaly is an object that is unusually influential in the creation of a data model.
(a) Compare this definition to that of the standard model-based definition of an anomaly. (b) For what sizes of data sets (small, medium, or large) is this definition appropriate?
The goal of the ____ function is to ensure a reliable level of secure practice across the entire organization.
A. enterprise continuity B. data security C. digital forensics D. training and awareness
Use the th element to indicate a table column or row _____.
a. data b. heading c. summary d. caption
Word tables can perform simple calculations
Indicate whether the statement is true or false