
a.
Explanation of Solution
Given:
An organization that has set up three security levels on data that are accessed by users.
Data in the C:/Public folder is categorized as low-security data.
Data in a shared folder that some users can access is categorized as medium-security data.
Data in an encrypted and shared folder which needs a password is categorized as high-security data.
To find:Â The data of the party of the company, which was held on 4 July, should be kept at which security level.
Solution:
The data of the party of the company, which was held on 4 July, can be categorized in the low-security level. The data will be stored in the public folder of C drive in the system.
b.
Explanation of Solution
Given:
An organization that has set up three security levels on data that are accessed by users.
Data in the C:/Public folder is categorized as low-security data.
Data in a shared folder that some users can access is categorized as medium-security data.
Data in an encrypted and shared folder which needs a password is categorized as high-security data.
To find: The data of company’s invention, which has not been patented yet, should be kept at which security level.
Solution:
The data of company’s invention, which has not been patented yet, can be categorized in the high-security level as this is very important and confidential data of the company. The data will be stored in the encrypted and shared folder which requires a password to access the data.
c.
Explanation of Solution
Given:
An organization that has set up three security levels on data that are accessed by users.
Data in the C:/Public folder is categorized as low-security data.
Data in a shared folder that some users can access is categorized as medium-security data.
Data in an encrypted and shared folder which needs a password is categorized as high-security data.
To find:Â The data of resumes of different people, who applied in the company, should be kept at which security level.
Solution:Â
The data of resumes of the applicants can be categorized at the low-security level as resumes do not contain confidential information. The data will be stored in the public folder of the C drive of the system.
d.
Explanation of Solution
Given:
An organization that has set up three security levels on data that are accessed by users.
Data in the C:/Public folder is categorized as low-security data.
Data in a shared folder that some users can access is categorized as medium-security data.
Data in an encrypted and shared folder which needs a password is categorized as high-security data.
To find:Â The data of the payroll spreadsheet should be kept at which security level.
Solution:Â
The data of the payroll spreadsheet can be categorized at medium-security level as it will be accessed by some specific user who has the authority to access the payroll information. The data will be stored in the shared that can be accessed by some users.
e.
Explanation of Solution
Given:
An organization that has set up three security levels on data that are accessed by users.
Data in the C:/Public folder is categorized as low-security data.
Data in a shared folder that some users can access is categorized as medium-security data.
Data in an encrypted and shared folder which needs a password is categorized as high-security data.
To find:Â The data of job openings details of the company should be kept at which security level.
Solution:Â
The data of job openings in the company can be categorized at low-security level. The data will be stored in the public folder of the C drive of the system.
Want to see more full solutions like this?
Chapter 16 Solutions
A+ Guide To It Technical Support
- Ensure you answer the question asked at the end of the document. Do not just paste things without the GNS3 console outputsarrow_forward"Do not use AI tools. Solve the problem by hand on paper only and upload a photo of your handwritten solution."arrow_forward"Do not use AI tools. Solve the problem by hand on paper only and upload a photo of your handwritten solution."arrow_forward
- "Do not use AI tools. Solve the problem by hand on paper only and upload a photo of your handwritten solution."arrow_forward"Do not use AI tools. Solve the problem by hand on paper only and upload a photo of your handwritten solution."arrow_forwardSolve this "Do not use AI tools. Solve the problem by hand on paper only and upload a photo of your handwritten solution."arrow_forward
- "Do not use AI tools. Solve the problem by hand on paper only and upload a photo of your handwritten solution."arrow_forward"Do not use AI tools. Solve the problem by hand on paper only and upload a photo of your handwritten solution."arrow_forwardSpecifications: Part-1Part-1: DescriptionIn this part of the lab you will build a single operation ALU. This ALU will implement a bitwise left rotation. Forthis lab assignment you are not allowed to use Digital's Arithmetic components.IF YOU ARE FOUND USING THEM, YOU WILL RECEIVE A ZERO FOR LAB2!The ALU you will be implementing consists of two 4-bit inputs (named inA and inB) and one 4-bit output (named out). Your ALU must rotate the bits in inA by the amount given by inB (i.e. 0-15).Part-1: User InterfaceYou are provided an interface file lab2_part1.dig; start Part-1 from this file.NOTE: You are not permitted to edit the content inside the dotted lines rectangle. Part-1: ExampleIn the figure above, the input values that we have selected to test are inA = {inA_3, inA_2, inA_1, inA_0} = {0, 1, 0,0} and inB = {inB_3, inB_2, inB_1, inB_0} = {0, 0, 1, 0}. Therefore, we must rotate the bus 0100 bitwise left by00102, or 2 in base 10, to get {0, 0, 0, 1}. Please note that a rotation left is…arrow_forward
- Np Ms Office 365/Excel 2016 I NtermedComputer ScienceISBN:9781337508841Author:CareyPublisher:CengagePrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Enhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage LearningA+ Guide To It Technical SupportComputer ScienceISBN:9780357108291Author:ANDREWS, Jean.Publisher:Cengage,Programming with Microsoft Visual Basic 2017Computer ScienceISBN:9781337102124Author:Diane ZakPublisher:Cengage Learning




