Sovi.AI - AI Math Tutor

Scan to solve math questions

QUESTION IMAGE

amore barca cruise lines cyber security access to wireless networks on …

Question

amore barca cruise lines cyber security access to wireless networks on the ship should be limited to approved devices. these devices should be given a strong password. passwords should be changed often. the ship should only use a wireless system that can verify the authenticity of websites, users, or devices. additionally, the ship should use a system that can block signals or information from any non - authorized device. protective devices, such as network plugs, will ensure rogue devices cannot hack into the system. only the ships captain and hotel director should be given administrator profiles. these senior officers can then control the creation or deletion of normal user profiles. user profiles should be restricted to certain computers, workstations and/or servers. user profiles should not allow the user to change the system or install and execute new programs. email communication between ship and shore is extremely important to a ships operation. secure email and web browsers should protect shoreside and onboard personnel from potential fraud. they should also prevent outsiders from obtaining private or sensitive information from passenger and crew email. secure email and web browsers should allow passengers and crew to safely talk, text, or send information without worrying about loss of privacy. finally, the ships secure email and web browsers should prevent anyone from creating, passing, sending, or receiving inappropriate content. there are a number of best practices for safe email transfer. the system should only allow assigned user accounts. users should always zip sensitive email or documents. last, all hyperlinks on email systems should be disabled. you work for amore barca cruise lines. according to the document shown, when emailing sensitive documents, it is recommended to: a. change passwords regularly b. make certain email browsers prevent potential fraud c. request a secure workstation d. install a network plug into the system e. zip the documents prior to sending

Explanation:

Brief Explanations

The text mentions that for safe email transfer of sensitive documents, users should always zip sensitive email or documents. This directly corresponds to option E.

Answer:

E. zip the documents prior to sending