answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nady [450]
2 years ago
8

Ciscon Telecom is a mobile operator in the European Union. The company provides personalized services to its customers, and its

databases contain valuable information about the customers. The loss of customer information that is used to decide services would be extremely harmful to the organization. Which of the following strategies adopted by Ciscon is an example of risk transference
A. The company insures any possible data loss for a large sum.
B. It installs a corporate firewall to protect unauthorized access to information.
C. The company forms a special team of top executives to monitor and correct the information policies.
D. The company decides to absorb any damages that might occur.
E. It enforces a strict employee data policy and prohibits employees from unauthorized access.
Computers and Technology
2 answers:
Dmitry [639]2 years ago
8 0

Answer:

A. The company insures any possible data loss for a large sum.

Explanation:

Risk transference is the transferring of risk to a third party. It shift the burden that arise from lose of data from one party to another party through legislation or contract agreement. It is a common risk management techniques.

In this question, Ciscon telecom would be transferring the risk of losing data to a third party.

LuckyWell [14K]2 years ago
7 0

Answer:

A. The company insures any possible data loss for a large sum.

Explanation:

Risk Transference  is a common risk management technique which involves shifting of the burden of loss for a risk to another party through legislation, contract, insurance or other means.

In the case loss of customer information that is used to decide services which would be extremely harmful to Ciscon,  Ciscon will need to insure any possible data loss for a large sum as an adopted strategy of risk transference.

You might be interested in
When preparing a spreadsheet that contains population data for different nations, what is the best way to provide a visual compa
finlep [7]
The best answer to the question above would be option C: <span>create a bar graph that shows population totals for each nation. Since it emphasizes a visual comparison, the best way to do this is to create a bar graph. So in a bar graph, the numerical values of the variables are also presented such as the population total of each nation. In addition, the rectangular bars can easily show you the difference between each nation which makes this an ideal visual tool for comparison.</span>
7 0
2 years ago
Read 2 more answers
There is a file "IT4983" in my home (personal) directory. I don’t know my current working directory. How can I find out the file
RoseWind [281]

Answer and Explanation:

Find / -name "IT4983"

See what it will do is it will find the file named IT4983 in the root directory.

run this commmand with sudo just in case for permission issues.

then it will give you the location of that file we want to find.

 

Or

$ file /home/IT4983 ( you can type this command from whichever directory you are )

output : IT4983 , ASCII TEXT

3 0
2 years ago
1. What should you do if your computer is shared by your entire family and you install a plugin that saves user names and passwo
Citrus2011 [14]

Explanation:

1 make sure only you know the password

2 having weak security on one browser is basically a doorway for someone to get into your network

7 0
2 years ago
Read 2 more answers
Dan is a Civil Engineer for a company that builds nuclear power plants throughout the world. Which best describes the places he
Yanka [14]
IN a laboratory... C 
4 0
2 years ago
Read 2 more answers
Kaira's company recently switched to a new calendaring system provided by a vendor. Kaira and other users connect to the system,
goldfiish [28.3K]

The service model that Kaira’s company is using is Saas

Explanation

Kaira’s company is using Software as a Service to access their new calendaring system that has been hosted by a 3rd party vendor over the web. It is the work of the SaaS to host specific applications and to deliver these applications to customers over the cloud. With SaaS, Kaira’s company does not need to install their calendaring software on their PCs. Every useful thing they want from their calendaring system can easily be accessed over the internet. All the company will need are personalized accounts with usernames and passwords for their employees to access.

The other different types of Cloud Computing services include;

  • PaaS: A set of tools and services designed to make coding and deploying those applications quick and efficient.
  • IaaS: hardware and software that powers it all – servers, storage, networks, and operating systems.

Learn more:

What is cloud computing?

brainly.com/question/2662575

Explain the three basic types of Cloud computing

brainly.com/question/12967175

#LearnwithBrainly

3 0
2 years ago
Other questions:
  • Why is the following statement true - ideally, your information is abbreviated
    10·2 answers
  • The Paste Options button labeled ____ is used if you want the pasted chart not to be linked to the source document but you want
    9·1 answer
  • Write a fragment of code that reads in strings from standard input, until end-of-file and prints to standard output the largest
    10·1 answer
  • Alex is nearing graduation. His counselor showed him this information. Alex's College Costs &amp; Payment Options per Year Costs
    5·2 answers
  • 10. (P37) Compare GBN, SR, and TCP (no delayed ACK). Assume that the timeout values for all three protocols are sufficiently lon
    12·1 answer
  • A third-grade teacher at Potter Elementary School wants a program that allows a student to enter the amount of money a customer
    14·1 answer
  • Five friends plan to try a startup. However, they have a limited budget and limited computer infrastructure. How can they avail
    11·1 answer
  • You have an on-premises network that contains several servers. You plan to migrate all the servers to Azure. You need to recomme
    14·1 answer
  • During the name resolution process, which technique is used to avoid congestion when querying a server
    8·1 answer
  • You are having a problem with your Windows computer that is isolated to a single graphics editing program that you use every day
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!