answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jekas [21]
2 years ago
6

You are a security consultant and have been hired to evaluate an organization's physical security practices. All employees must

pass through a locked door to enter the main work area. Access is restricted using a smart card reader. Network jacks are provided in the reception area such that employees and vendors can access the company network for work-related purposes. Users within the secured work area have been trained to lock their workstations if they will be leaving them for any period of time. Which of the following recommendations would you MOST likely make to this organization to increase their security?
A. Disable the switch ports connected to the network jacks in the reception area.
B. Move the receptionist's desk into the secured area.
C. Require users to use screensaver passwords.
D. Replace the smart card reader with a key code lock.
Computers and Technology
1 answer:
7nadin3 [17]2 years ago
4 0

Answer:

D. Replace the smart card reader with a key code lock.

Explanation:

In other to increase the security of the company, the best security practice would be to replace the smart card reader with a key code lock. This is because, with the smart card reader, an unauthorised person who was able to pick up one of the cards could be able to access the secured work station.

<em>On the other hand, if the area is accessed with key code lock, the, it is only the person who knows the code that will be able to access the secured work area. Of course, the key code will vary from one individual to another in the organization.</em>

You might be interested in
Sara is using her personal laptop (which is password protected) at a "hotspot" at a local cafe with wifi access. She is in the m
Ymorist [56]

Answer:

C) Exit all programs and shut down the compute

Explanation:

4 0
2 years ago
E xercise 17.2.4: The following is a sequence of undo-log records written by two transactions T and U: &lt; START T&gt;; ; &lt;
masya89 [10]

Answer:

Check the explanation

Explanation:

The following is a sequence of Undo — log records written by two transactions.

<START 1>; <F, A, 10>; <START U>; <U, B, 20>; <F, C, 30>; <U, D, 40>; <COMMIT U>; <T, E, 50>; <COMMIT T>; (a) < START U >;

If the system crashes after the log < START U >,

Then we have log records will be shown below.

<START U>;

<T, A, 10>;

<START T>;

SYSTEM CRASHED

The recovery manager sees the Undo - Redo log and inspect the both trans-actions T and U are not committed. Then those elements changed by both transactions are arranged to their old values.

  1. Transaction T changes the element A.
  2. Then the Element A is arranged to old value A=10.
  3. Transaction U did not change any existing element in the records.
  4. So, not anything to do with transaction U.

(B) < T, E, 50>;

If the system crashes after the log < T, E, 50>;

Then we have log records will be shown below .

START T>;

<T, A, 10>;

<START U>;

<U, B, 20>;

<T, C, 30>;

<U, D, 40>;

<COMMIT U>;

<T, E, 50>;

SYSTEM CRASHED

The recovery manager sees the Redo logs and inspect the transaction U is committed or not. Such changes made by transaction U are reached to disk.

• So much the recovery manager arranged the elements to their recent values changed by transaction U.

• Transaction U changed the elements B and its records <U, B, 20>with re-cent values.

• Transaction U changed the elements D and its records <U, D, 40>with recent values.

• The transaction T is not committed.

• Then the elements changed by transaction T are arranged to old values.

• Then element A is arranged to 10, C is arranged to 30 and E is arranged to 50.

7 0
2 years ago
Provide an example by creating a short story or explanation of an instance where availability would be broken.
noname [10]

Explanation:

Personal Insurance

Confidentiality in the workplace: What you need to know

When you give advice to clients or patients for a living, you'll know that protecting sensitive and personal information is crucial. But are you clear on what counts as a breach of confidence or what to do if one occurs?

From how to protect confidential information, to what breaches of confidence look like for different jobs, here's what you need to know about confidentiality in the workplace.

What is a breach of confidentiality?

In short, a confidentiality breach is the disclosure of information to someone without the consent of the person who owns it. In other words, failing to respect a person's privacy or the confidence in which they gave the information or data to you, by passing it onto someone else.

Why is confidentiality important?

Protecting confidential information is vital. If you're in a position where you have access to or are given this type of data at work, your career relies on your ability to keep patient or client confidentiality. If you don't, you could lose trust and integrity in the eyes of your existing (and potential future) clients, who could terminate your contract and take legal action against you.

Therapist/patient confidentiality

Unsurprisingly, patient confidentiality is highly important for therapists and counsellors. It forms part of the therapeutic frame of appropriate boundaries, which creates a safe space for a good working relationship to form.

Here’re some examples of ways you could unintentionally break patient/therapist confidentiality:

Sharing confidential information about a client with a family member or friend

Talking about confidential information somewhere you can be overheard

Leaving your computer containing confidential information open to others

Continuing to work with a client when there's a conflict of interests (for example, they know one of your family members or friends)

When permission to share information is given but isn't specific, this can create confusion and result in a potential breach (for example, a patient may give permission for their information to be shared with a teacher but not their GP)

7 0
1 year ago
How efficient would a 6-bit code be in asynchronous transmission if it had 1 parity bit, 1 start bit, and 2 stop bits?
Lana71 [14]
How efficient well if we are transmitting 6bits and we need 10 to transmit the 6 bits that would be 6/10 = .6 = 60% efficient.
7 0
2 years ago
Explain the history of computing of mechanical era
OLga [1]

Answer:The Mechanical Era

Created a machine that could add and subtract numbers. Dials were used to enter the numbers. ... Designed a machine called the Analytical Engine. The design had all the basic components of a modern day computer. In addition, it was designed to be programmable using punched cards.

Explanation:Hope this helped

4 0
2 years ago
Read 2 more answers
Other questions:
  • Which references are updated when you copy the formula =$E6-MAX(H$1:J4)
    10·1 answer
  • Which of these words could byte pair encoding compress the most?
    13·1 answer
  • QUESTION 2 of 10: New shoes are on SALE. You find a pair you like for $85 dollars. But you only have $45 with you. So, you pay $
    13·1 answer
  • In defining security implemention, what are the roles of the following committees. 1) gateway committee 2) project committee 3)
    8·1 answer
  • A company wants to publish Knowledge articles to its Customer Community. The articles should be organized for easy navigation by
    6·1 answer
  • You realize your computer has been infected with malware. It seems as if someone is controlling your computer from a remote loca
    5·1 answer
  • A Color class has a method getColorName that returns a string corresponding to the common name for the color, e.g., yellow, blue
    11·1 answer
  • You are modeling a small part of an online flight reservation system, according to the following description. A flight is a sing
    11·1 answer
  • Let's revisit our lucky_number function. We want to change it, so that instead of printing the message, it returns the message.
    10·1 answer
  • Which option in the Caption dialog box configures whether the caption appears above or below the image
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!