From a security monitoring perspective, which TWO solutions can prevent access for hackers, as oppose to preventing corruption in cyber security
A new warehouse manager, Sam, was appointed in a busy manufacturing facility, which received hundreds of inbound deliveries each week of raw materials, packaging and machine maintenance parts. Sam was advised that there were numerous instances where goods would arrive late causing delays in production, but deliveries were never formally recorded. Sam’s first task was to begin tracking these deliveries via the new smartphones and web-based portals that were interfaced with their suppliers. Sam then began to monitor and measure the delivery performance of the suppliers to identify the problematic ones. Sam held weekly meetings with the procurement and planning teams to feedback the new information in order to build a supplier OTIF portfolio. What action has Sam taken with the data?
Tina, a Marketing officer for an advertising agency, discovered that her organisation was not fully complying to General Data Protection Rights (GDPR) rules. She discovered that personal data was being collected electronically and sold onto 3rd party organisations, without permission. Tina brought this up with Human Resources due to the potential fine and negative reputation that the company could receive if they were found guilty. As a result of no action being taken, Tina made the decision to end her employment with the agency, and demanded to retrieve a copy of her own personal data, and also to made aware if there were any data breaches meaning her data was no longer secure. Which General Data Protection Rights (GDPR) is Tina invoking?
Select TWO places where data can be stored, and therefore retrieved from, on a computer
When comparing Business Intelligence (BI) with Data Analytics, select ALL characteristics of Analytics
© Copyrights DumpsEngine 2024. All Rights Reserved
We use cookies to ensure your best experience. So we hope you are happy to receive all cookies on the DumpsEngine.