Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Question 1 Dawn is selecting an alternative processing facility for her organiza

ID: 3857807 • Letter: Q

Question

Question 1

Dawn is selecting an alternative processing facility for her organization's primary data center. She would like to have a facility that balances cost and switchover time. What would be the best option in this situation?

A)

Warm site

B)

Primary site

Question 2

A hospital is planning to introduce a new point-of-sale system in the cafeteria that will handle credit card transactions. Which one of the following governs the privacy of information handled by those point-of-sale terminals?

A)

Payment Card Industry Data Security Standard (PCI DSS)

B)

Federal Information Security Management Act (FISMA)

Question 3

Which one of the following is an example of a logical access control?

A)

Password

B)

Fence

Question 4

During which phase of the access control process does the system answer the question, "What can the requestor access?"

A)

Authorization

B)

Accountability

A)

Warm site

B)

Primary site

Explanation / Answer

1.

The warm site is used to back up the data on a workstation. This site has network connectivity, operating on the low scale than the hot sites. The warm site works somewhat between the hot and cold sites.

Hence, the correct choice is A). warm site.

2.

The information related to the credit card transactions are handled by the payment card industry because the this industry maintains the privacy of the information of the card holders. The payment card industry has control over the information of the card holders to maintain the privacy and to reduce the frauds.

Hence, the correct choice is A). payment card industry data security standard (PCI DSS).

3.

The logical access control is the process to maintain the security standards of a system. In this process, a user can access the system by the login password, if and only if the user is authorized. The system is secured by a login password.

Hence, the correct choice is A). password.

4.

The phase of the access control process which answers the query, “what can the requestor access” is the authorization because in this phase, the user will be granted the permission to access the system and will be authorized to access the system details.

Authorization enables the user to access specific details of the system by a login password.

Hence, the correct choice is A). authorization.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote