Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

QUESTION 17 Type of system solutions employed to manage e-documents and records for security, auditing, searching, record retention and disposition, and version control which are

QUESTION 17

  1. Type of system solutions employed to manage e-documents and records for security, auditing, searching, record retention and disposition, and version control which are predominantly repository based and provide for collaborative workspaces for unstructured information are referred to generally as _______

    A.

    Enterprise Content Management Systems

    B.

    IAM Systems

    C.

    Information Governance Systems

    D.

    Information Technology Systems

    E.

    Data Model Frameworks

2 points

QUESTION 18

  1. Which of the following is not among the threats to Long Term Digital Preservation (LTDP) of records?

    A.

    Human Error, it cannot impact LTDP of data because LTDP of data is performed electronically

    B.

    Failure of storage media, it cannot affect the ability to preserve records long term because LTDP is media independent

    C.

    Network communications failures, it cannot adversely impact LTDP because network communications is never used in LTDP

    D.

    Component obsolesence, is not a treat to LTDP of records because the records will never reside on a hardware component part

    E.

    None of the above is a correct answer since all of the above are threats to LTDP.

2 points

QUESTION 19

  1. Microsoft Search Server's enterprise Search engine portion of SharePoint that can be integrated into the ___ to provide advanced indexing and searching capabilities

    A.

    MOSS

    B.

    WSS

    C.

    ITIL

    D.

    Firewall

    E.

    WWE

2 points

QUESTION 20

  1. Which of the following has been characterized as among the greatest social media security threats that an enterprise faces?

    A.

    The general lack of social media policy inside the organization

    B.

    .Employees who create a potential insider threat because they fail to comprehend the negative impact that their behavior in posting to social media sites has on the organization

    C.

    The casua use of public comments can create liability for the employer

    D.

    All of the above are important threats to the organization that must be considered when developing a company social media policy

    E.

    .None of the above is the correct answer since businesses can't be held accountable for what their employees do on social media such as facebook and twitter

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Data Infrastructure For Medical Research In Databases

Authors: Thomas Heinis ,Anastasia Ailamaki

1st Edition

1680833480, 978-1680833485

More Books

Students also viewed these Databases questions

Question

=+1. Does your message use pretentious or exaggerated language?

Answered: 1 week ago