A+ Guide To It Technical Support
A+ Guide To It Technical Support
10th Edition
ISBN: 9780357108291
Author: ANDREWS, Jean.
Publisher: Cengage,
Expert Solution & Answer
Book Icon
Chapter 16, Problem 1TC

a.

Explanation of Solution

Given:

An organization that has set up three security levels on data that are accessed by users.

Data in the C:/Public folder is categorized as low-security data.

Data in a shared folder that some users can access is categorized as medium-security data.

Data in an encrypted and shared folder which needs a password is categorized as high-security data.

To find: The data of the party of the company, which was held on 4 July, should be kept at which security level.

Solution:

The data of the party of the company, which was held on 4 July, can be categorized in the low-security level. The data will be stored in the public folder of C drive in the system.

b.

Explanation of Solution

Given:

An organization that has set up three security levels on data that are accessed by users.

Data in the C:/Public folder is categorized as low-security data.

Data in a shared folder that some users can access is categorized as medium-security data.

Data in an encrypted and shared folder which needs a password is categorized as high-security data.

To find: The data of company’s invention, which has not been patented yet, should be kept at which security level.

Solution:

The data of company’s invention, which has not been patented yet, can be categorized in the high-security level as this is very important and confidential data of the company. The data will be stored in the encrypted and shared folder which requires a password to access the data.

c.

Explanation of Solution

Given:

An organization that has set up three security levels on data that are accessed by users.

Data in the C:/Public folder is categorized as low-security data.

Data in a shared folder that some users can access is categorized as medium-security data.

Data in an encrypted and shared folder which needs a password is categorized as high-security data.

To find: The data of resumes of different people, who applied in the company, should be kept at which security level.

Solution: 

The data of resumes of the applicants can be categorized at the low-security level as resumes do not contain confidential information. The data will be stored in the public folder of the C drive of the system.

d.

Explanation of Solution

Given:

An organization that has set up three security levels on data that are accessed by users.

Data in the C:/Public folder is categorized as low-security data.

Data in a shared folder that some users can access is categorized as medium-security data.

Data in an encrypted and shared folder which needs a password is categorized as high-security data.

To find: The data of the payroll spreadsheet should be kept at which security level.

Solution: 

The data of the payroll spreadsheet can be categorized at medium-security level as it will be accessed by some specific user who has the authority to access the payroll information. The data will be stored in the shared that can be accessed by some users.

e.

Explanation of Solution

Given:

An organization that has set up three security levels on data that are accessed by users.

Data in the C:/Public folder is categorized as low-security data.

Data in a shared folder that some users can access is categorized as medium-security data.

Data in an encrypted and shared folder which needs a password is categorized as high-security data.

To find: The data of job openings details of the company should be kept at which security level.

Solution: 

The data of job openings in the company can be categorized at low-security level. The data will be stored in the public folder of the C drive of the system.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
Which NTFS feature allows you to link an empty folder in one volume to another volume? a) Volume mount points O b) Linked Volumes Symbolic links d) EFS e) Data quotas f) Empty Volumes
Which of the following statements best describes how you feel about the safety of data while it is being sent or stored: Which of these choices will provide the best results, both in terms of the integrity of the data and the authentication of the users?
Please define the terms "integrity" and "authorization."
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
A+ Guide To It Technical Support
Computer Science
ISBN:9780357108291
Author:ANDREWS, Jean.
Publisher:Cengage,
Text book image
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning