Your organization has set up three levels of classification for data accessed by users on a small network: Low security: Data in the C:\Public folder Medium security: Data in a shared folder that some, but not all, user groups can access High security: Data in a shared and encrypted folder that requires a password to access. The folder is shared only to one user group. Classify each of the following sets of data: a. Directions to the company's Fourth of July party b. Details of an invention made by the company president that has not yet been patented c. Resumes presented by several people applying for a job with the company d. Payroll spreadsheets e. Job openings at the company
What will be an ideal response?
a. Low; b. High; c. Medium; d. Medium or High; e. Low
Computer Science & Information Technology
You might also like to view...
Threat assessments are a prerequisite to implementing a risk management function.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Jade has planned to open a new cosmetics shop.Before starting her business, she wishes to identify and analyze her potential customers. Jade can obtain the required information from _____ databases.
A. ?government B. ?marketing C. ?finance D. ?property
Computer Science & Information Technology
The ____ function returns the number of characters in a field.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
The KDC component of Kerberos knows the secret keys of all clients and servers on the network.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology