Question 1 Dawn is selecting an alternative processing facility for her organiza
ID: 3857807 • Letter: Q
Question
Question 1
Dawn is selecting an alternative processing facility for her organization's primary data center. She would like to have a facility that balances cost and switchover time. What would be the best option in this situation?
A)
Warm site
B)
Primary site
Question 2
A hospital is planning to introduce a new point-of-sale system in the cafeteria that will handle credit card transactions. Which one of the following governs the privacy of information handled by those point-of-sale terminals?
A)
Payment Card Industry Data Security Standard (PCI DSS)
B)
Federal Information Security Management Act (FISMA)
Question 3
Which one of the following is an example of a logical access control?
A)
Password
B)
Fence
Question 4
During which phase of the access control process does the system answer the question, "What can the requestor access?"
A)
Authorization
B)
Accountability
A)
Warm site
B)
Primary site
Explanation / Answer
1.
The warm site is used to back up the data on a workstation. This site has network connectivity, operating on the low scale than the hot sites. The warm site works somewhat between the hot and cold sites.
Hence, the correct choice is A). warm site.
2.
The information related to the credit card transactions are handled by the payment card industry because the this industry maintains the privacy of the information of the card holders. The payment card industry has control over the information of the card holders to maintain the privacy and to reduce the frauds.
Hence, the correct choice is A). payment card industry data security standard (PCI DSS).
3.
The logical access control is the process to maintain the security standards of a system. In this process, a user can access the system by the login password, if and only if the user is authorized. The system is secured by a login password.
Hence, the correct choice is A). password.
4.
The phase of the access control process which answers the query, “what can the requestor access” is the authorization because in this phase, the user will be granted the permission to access the system and will be authorized to access the system details.
Authorization enables the user to access specific details of the system by a login password.
Hence, the correct choice is A). authorization.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.