Question
QUESTION 25 One of your departmental managers tells you, I am thinking about protecting our MicroSoft Office files by password protecting the files. I am
QUESTION 25
-
One of your departmental managers tells you, "I am thinking about protecting our MicroSoft Office files by password protecting the files. I am told many organizations all over the world do this." What do you think? Do you see any downsides? Your best response is_____
A. Your are right, it is used all over the world. But make sure that you know what the password is because if the employee who creates the password leaves you are stuck because you can't retrieve it.
B. I don't think anybody has ever used it. It just doesn't exist with MicroSoft file applications
C. Sure go for it. I don't see any problems. It would be good with the number of employees who are coming and going these days
D. I don't think it will work of you are also using a firewall, so be careful
E. Yeah, its okay but you are limited to only 6 characters and it has weak securty
2 points
QUESTION 26
-
What is the difference between COBIT 4.1 and CobiT 5?
A. CobiT 5 does not include key principles for governance and management
B. CobiT 5 does not include enablers
C. CobiT 5 is a value oriented framework where COBIT 4.1 is a process based framework
D. CobiT 5 does not relate to the ISO standard whereas COBIT 4.1 does
E. None of the above is the correct answer
2 points
QUESTION 27
-
By comparison, which of the following types of archival information packet migration would have the greatest risk of potential loss of information?
A. Repackage migration
B. Migration replication
C. Migration transformation
D. Migration refreshment
E. Migration assessment
2 points
QUESTION 28
-
You, a U.S. citizen wish to request a copy of Hillary Clinton's emails that have been disclosed to the U.S. Government, which were stored on her private server in her basement. You would most likely use which federal law to try to get access to these documents?
A. The Federal Wiretapping Act
B. The Federal Criminal Abuse Act
C. The Freedom of Information Act
D. The Whitewater Act
E. The Monica Lewenski Act
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started