One of the security challenges for big data is controlling access to the data stored within the massive data structure. Efforts to apply traditional access control and authorization settings to individual options within the data store have produced lack-luster results or unsatisfactory performance. A new technique being applied which shows promise. What is the new technique of controlling access to the content of big data information collections?
A. Reset all permissions on all data objects to group access.
B. Set all data objects as being owned by the IT manager.
C. Implement only physical security restrictions.
D. Apply security controls to the output of data-mining operations.
Answer: D. Apply security controls to the output of data-mining operations.
You might also like to view...
List the two kinds of derived surfaces.
What will be an ideal response?
What will be output from the following code:
``` { for ( int x = 5 ; x > 0 ; x--) { System . out . println ( x ) ; } } ```
When a message travels from one computer to the next, it starts at the ____ layer.
A. Physical B. Transport C. Application D. Internet
Case-Based Critical Thinking Questions ? Case 2-1 Using PowerPoint 2016, Kyle develops a presentation on the geography of Asia. His presentation includes several shapes. ? ? To open a menu of Rotate and Flip commands, Kyle clicks the ____ button.
A. Rotate B. Flip C. Move D. Shape