PoiT 5.3.2 Sharing Information and File Security
Natasha should have stored the backup files on a different server, or on an FTP, where the virus would not likely have reached them
Natasha is eager to protect her files. Every time she saves a file to her project folder, she saves a copy to a subfolder labeled "Backup Files," which she stores within the main project folder. One day, a virus appears on her computer, corrupting all the files in her project folder. Natasha doesn't stress over it because she has an extra copy of all her files in the subfolder. However, when Natasha goes to retrieve the backup files in the subfolder, she discovers they have all been corrupted as well.
likely to be stolen and abused
Unencrypted information is:
It helps you keep track of each stage of the editing process
What is the main benefit of using a consistent system to label your files?
FTP sites, cloud storage, instant messaging, and email
Where can viruses occur?
Sanjay, who manages a team of freelance writers who work in different locations
Which of the following employees would benefit most from using an FTP site?
Scan your files for viruses after you send them to someone else
Which of the following is an ineffective way to securely share information?
4n&77Q because it is a hard combination to guess
Which password is better, Fan4Life or 4n&77Q?
Upload the file to an FTP site and then email the colleague with a link to the site.
Your co-worker is at a conference in another state. She requests that you send her the current draft of the report you are working on. You create an email, attach the file, and click Send. A few seconds later, you receive an error report: The attachment was too large to go through. What should you do next?