?You work for a company that is growing. Originally, all the users in all departments had access to all the data in the database. It is considered a security risk. What is an appropriate action to reduce the risk?

A. ?Install a two-step login procedure, where the user has to key in additional information for logging in
B. Install and provide stronger anti-virus software on the users' computers
C. Tweak the firewall parameters so that outgoing traffic can be better controlled
D. Assign roles and privileges to users so that only job-relevant data is accessible to the user.


Answer: D

Computer Science & Information Technology

You might also like to view...

The maxOccurs attribute can have a value of ____ for unlimited occurrences of the child element.

A. unlimited B. max C. 100 D. unbounded

Computer Science & Information Technology

________, most commonly found in business, process massive amounts of data or transactions

A) Mainframes B) Supercomputers C) Clients D) Workstations

Computer Science & Information Technology

The ________ portion of a payment is the cost of the loan

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

 In a relational database, each row should be ____.

A. updated B. unique C. normalized D. non-descript

Computer Science & Information Technology