A+ Guide To It Technical Support
A+ Guide To It Technical Support
10th Edition
ISBN: 9780357108291
Author: ANDREWS, Jean.
Publisher: Cengage,
Expert Solution & Answer
Book Icon
Chapter 16, Problem 1TC

a.

Explanation of Solution

Given:

An organization that has set up three security levels on data that are accessed by users.

Data in the C:/Public folder is categorized as low-security data.

Data in a shared folder that some users can access is categorized as medium-security data.

Data in an encrypted and shared folder which needs a password is categorized as high-security data.

To find: The data of the party of the company, which was held on 4 July, should be kept at which security level.

Solution:

The data of the party of the company, which was held on 4 July, can be categorized in the low-security level. The data will be stored in the public folder of C drive in the system.

b.

Explanation of Solution

Given:

An organization that has set up three security levels on data that are accessed by users.

Data in the C:/Public folder is categorized as low-security data.

Data in a shared folder that some users can access is categorized as medium-security data.

Data in an encrypted and shared folder which needs a password is categorized as high-security data.

To find: The data of company’s invention, which has not been patented yet, should be kept at which security level.

Solution:

The data of company’s invention, which has not been patented yet, can be categorized in the high-security level as this is very important and confidential data of the company. The data will be stored in the encrypted and shared folder which requires a password to access the data.

c.

Explanation of Solution

Given:

An organization that has set up three security levels on data that are accessed by users.

Data in the C:/Public folder is categorized as low-security data.

Data in a shared folder that some users can access is categorized as medium-security data.

Data in an encrypted and shared folder which needs a password is categorized as high-security data.

To find: The data of resumes of different people, who applied in the company, should be kept at which security level.

Solution: 

The data of resumes of the applicants can be categorized at the low-security level as resumes do not contain confidential information. The data will be stored in the public folder of the C drive of the system.

d.

Explanation of Solution

Given:

An organization that has set up three security levels on data that are accessed by users.

Data in the C:/Public folder is categorized as low-security data.

Data in a shared folder that some users can access is categorized as medium-security data.

Data in an encrypted and shared folder which needs a password is categorized as high-security data.

To find: The data of the payroll spreadsheet should be kept at which security level.

Solution: 

The data of the payroll spreadsheet can be categorized at medium-security level as it will be accessed by some specific user who has the authority to access the payroll information. The data will be stored in the shared that can be accessed by some users.

e.

Explanation of Solution

Given:

An organization that has set up three security levels on data that are accessed by users.

Data in the C:/Public folder is categorized as low-security data.

Data in a shared folder that some users can access is categorized as medium-security data.

Data in an encrypted and shared folder which needs a password is categorized as high-security data.

To find: The data of job openings details of the company should be kept at which security level.

Solution: 

The data of job openings in the company can be categorized at low-security level. The data will be stored in the public folder of the C drive of the system.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
A school is upgrading its website and will require students to create a password to access theirmarks online. In order to create secure passwords, students will be required to meet certainconditions.a. Determine the total number of possible 4-character passwords that can be created using eachof the following requirements:   the digits 0 to 9, where digits cannot be repeated
A school is upgrading its website and will require students to create a password to access theirmarks online. In order to create secure passwords, students will be required to meet certainconditions.a. Determine the total number of possible 4-character passwords that can be created using eachof the following requirements:   Describe a different set of conditions that can be used to create a secure 4-characterpassword. Determine the total number of possible passwords that can be created using yourconditions.
A school is upgrading its website and will require students to create a password to access theirmarks online. In order to create secure passwords, students will be required to meet certainconditions.a. Determine the total number of possible 4-character passwords that can be created using eachof the following requirements:i. the digits 0 to 9, where digits can be repeated
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
A+ Guide To It Technical Support
Computer Science
ISBN:9780357108291
Author:ANDREWS, Jean.
Publisher:Cengage,
Text book image
LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
Computer Science
ISBN:9781337569798
Author:ECKERT
Publisher:CENGAGE L