TELECOMMUNICATIONS SYSTEMS
HOW STAR BUS RING MESH TOPOLOGY CONNECT COMPUTER NETWORKS IN ORGANIZATIONS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
TRUE
|
|
FALSE
|
|
Either A or B
|
|
None of the above
|
Detailed explanation-1: -A company’s CISO is the leader and face of data security in an organization. The person in this role is responsible for creating the policies and strategies to secure data from threats and vulnerabilities, as well as devising the response plan if the worst happens.
Detailed explanation-2: -Physical access control is utilizing physical barriers which can help prevent unauthorized users from accessing systems.
Detailed explanation-3: -Encryption ensures the integrity of data by protecting it from unauthorized modification. Encryption reduces the risk of accessing data from untrustworthy sources by verifying data’s source.
Detailed explanation-4: -Confidentiality. Confidentiality refers to the protection of information from unauthorized access or disclosure. Ensuring confidentiality is ensuring that those who are authorized to access information are able to do so and those who are not authorized are prevented from doing so.