CIS 349 RANK Future Starts Here/cis349rank.com CIS 349 RANK Future Starts Here/cis349rank.com | Página 6

other strategies to protect the organization from data or functionality loss. 23) From the perspective of application architectures, which of the following is generally not considered a critical application resource? 24) Which plan would address steps to take when a water main break interrupts water flow to your main office? 25) Who is responsible for verifying and testing an organization’s code of conduct? =================================================== CIS 349 Week 2 Assignment 1 Designing Ferpa Technical Safeguards (2 Papers) FOR MORE CLASSES VISIT www.cis349rank.com Imagine you are an Information Security consultant for a small college registrar’s office consisting of the registrar and two (2) assistant registrars, two (2) student workers, and one (1) receptionist. The office is physically located near several other office spaces. The assistant registrars utilize mobile devices over a wireless network to access student records, with the electronic student records being stored on a server located in the building. Additionally, each registrar’s office has a desktop computer that utilizes a wired network to access the server and electronic student records. The receptionist station has a desktop computer that is used to schedule appointments, but cannot access student records. In 1974, Congress enacted the Family