Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

QUESTION 25 One of your departmental managers tells you, I am thinking about protecting our MicroSoft Office files by password protecting the files. I am

QUESTION 25

  1. One of your departmental managers tells you, "I am thinking about protecting our MicroSoft Office files by password protecting the files. I am told many organizations all over the world do this." What do you think? Do you see any downsides? Your best response is_____

    A.

    Your are right, it is used all over the world. But make sure that you know what the password is because if the employee who creates the password leaves you are stuck because you can't retrieve it.

    B.

    I don't think anybody has ever used it. It just doesn't exist with MicroSoft file applications

    C.

    Sure go for it. I don't see any problems. It would be good with the number of employees who are coming and going these days

    D.

    I don't think it will work of you are also using a firewall, so be careful

    E.

    Yeah, its okay but you are limited to only 6 characters and it has weak securty

2 points

QUESTION 26

  1. What is the difference between COBIT 4.1 and CobiT 5?

    A.

    CobiT 5 does not include key principles for governance and management

    B.

    CobiT 5 does not include enablers

    C.

    CobiT 5 is a value oriented framework where COBIT 4.1 is a process based framework

    D.

    CobiT 5 does not relate to the ISO standard whereas COBIT 4.1 does

    E.

    None of the above is the correct answer

2 points

QUESTION 27

  1. By comparison, which of the following types of archival information packet migration would have the greatest risk of potential loss of information?

    A.

    Repackage migration

    B.

    Migration replication

    C.

    Migration transformation

    D.

    Migration refreshment

    E.

    Migration assessment

2 points

QUESTION 28

  1. You, a U.S. citizen wish to request a copy of Hillary Clinton's emails that have been disclosed to the U.S. Government, which were stored on her private server in her basement. You would most likely use which federal law to try to get access to these documents?

    A.

    The Federal Wiretapping Act

    B.

    The Federal Criminal Abuse Act

    C.

    The Freedom of Information Act

    D.

    The Whitewater Act

    E.

    The Monica Lewenski Act

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

25 Vba Macros For Data Analysis In Microsoft Excel

Authors: Klemens Nguyen

1st Edition

B0CNSXYMTC, 979-8868455629

More Books

Students also viewed these Databases questions

Question

How is the number of factors decided in most EFA programs?

Answered: 1 week ago