Part 2. Exercise QuestionsRefer to the following scenario for Questions 1, 2, and 3: You are a database administratorworking for a national bank institution. One day, a lead developer sends you an e-mail requestingthat you perform a data change. In the e-mail, he stresses the urgency and importance of this task.A minute later, you receive another e-mail but this is from the lead developer’s manager toconfirm the data change. This is the first time you have ever received this type of request.Usually, all requests go through the change management process. You can answer the questionfrom a framework of CIA.Question 1. List the security issues involved in this incident.Question 2. Describe the type of risks involved if you comply with the request and the types ofrisk involved if you do not.Question 3. Explain briefly how you would react to this incident, outlining your reasoning andwhether you would comply or not.Question 4. define the principle of least privilege. Why is this an importantconcept to database security?Question 5. describe the concept of defense in depth as it pertains toinformation security. List and explain at least three examples of security measures that can beimplemented in a “defense in depth” strategy.
I don’t understand this English question and need help to study. Essay 1: Summary/Response (Closely…
Help me study for my History class. I’m stuck and don’t understand. Write a 400…
I’m studying for my Philosophy class and don’t understand how to answer this. Can you…
I don’t understand this Psychology question and need help to study. In a few sentences,…
Need help with my Philosophy question - I’m studying for my class. Week #06 Discussion…
I’m trying to study for my History course and I need some help to understand…