subject

Your organization has set up three levels of data classification accessed by users on a small network: • Low security: Data in the C:\Public folder
• Medium security: Data in a shared folder that some, but not all, user groups can access
• High security: Data in a shared and encrypted folder that requires a password to access.
• The folder is shared only to one user group.
Classify each of the sets of data:¬¬¬¬ Directions to the company Fourth of July party
33) Details of an invention made by the company president that has not yet been patented
34) Résumés presented by several people applying for a job with the company
35) Payroll spreadsheets
36) Job openings at the company
You work in the Accounting Department and have been using a network drive to post Excel workbook files to your file server as you complete them. When you attempt to save a workbook file to the drive, you see the error message: "You do not have access to the folder ‘J:\’. See your administrator for access to this folder." What should you do first? Second? Explain the reasoning behind your choices.
37) Ask your network administrator to give you permission to access the folder.
38) Check Windows Explorer to verify that you can connect to the network.
39) Save the workbook file to your hard drive.
40) Using Windows Explorer, remap the network drive.
41) Reboot your PC. 42) EXPLAIN:

ansver
Answers: 2

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 22:30, jacob7542
The qwerty keyboard is the most common layout of keys on a keyboard
Answers: 3
image
Computers and Technology, 22.06.2019 23:00, cchotshot
Is an attack that relies on guessing the isns of tcp packets
Answers: 2
image
Computers and Technology, 23.06.2019 14:30, rose6038
Select the correct answer. peter has launched a website that features baby products. however, clients often find they are unable to access the website because the server is down. which feature of cybersecurity should peter focus on for his website? a. data authenticity b. data privacy c. data availability d. data integrity e. data encryption
Answers: 3
image
Computers and Technology, 24.06.2019 00:50, anthonycraig0205
3. what is the output of the following statements? temporary object1; temporary object2("rectangle", 8.5, 5); temporary object3("circle", 6, 0); temporary object4("cylinder", 6, 3.5); cout < < fixed < < showpoint < < setprecision(2); object1.print(); object2.print(); object3.print(); object4.print(); object1.set("sphere", 4.5, 0); object1.print();
Answers: 1
You know the right answer?
Your organization has set up three levels of data classification accessed by users on a small networ...

Questions in other subjects:

Konu
English, 15.12.2020 19:40
Konu
History, 15.12.2020 19:40
Konu
Mathematics, 15.12.2020 19:40