1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mademuasel [1]
2 years ago
14

Which of the following are responsibilities of information security management? Defining the protection required for systems and

data Undertaking risk assessments Producing the Information security policy Implementing security measures to new systems during service transition
Computers and Technology
1 answer:
Talja [164]2 years ago
4 0

Answer:

all of them are responsibilities

Explanation:

You might be interested in
Which tool do web designers use to select colors that complement each other?
DaniilM [7]
•color pick eye dropper chrome extension
•color snapper2
•happy hues
•coolors
3 0
1 year ago
What does an operating system do
3241004551 [841]

Answer: An operating system manages and runs all of the hardware and software installed onto the computer.

Explanation:

It performs basic tasks such as file, memory, and process management, handling input and output, and controlling peripheral devices such as disk drives and printers.

7 0
9 months ago
You can separate words in a macro name by using the ____ character
Maru [420]
You can separate words in a macro name by using the underscore character.

A macro is considered as a small reusable computer program. It is efficient as it helps you save time by automating any repeated task.
In order to create a macro, you do not need to be an expert in programming, however, a little knowledge about it will help.

8 0
3 years ago
Read 2 more answers
You want to view a list of users on a linux system. what command should you use?
vredina [299]
Answer is A: cat /use/passwd
7 0
1 year ago
Which ipsec component is software that handles the tasks of encrypting, authenticating, decrypting, and checking packets?
ad-work [718]
The ipsec component software that handles the tasks of encrypting, authenticating, decrypting, and checking packets is called IKE.  It is short for Internet Key Exchange.  It is <span>a network security Protocol aimed to allow two devices to actively exchange Encryption Keys and negotiate Security Associations </span>
8 0
2 years ago
Other questions:
  • List the steps that you need to locate Microsoft Word on your computer
    7·1 answer
  • PLEASE HELP
    14·2 answers
  • What acronym describes networked devices that contain microcomputers but are not thought of as computing devices, such as refrig
    9·1 answer
  • What an underlined word or phrase represents? (HTML AND CSS), has to be 9 letters long. kinda urgent
    11·1 answer
  • How many address bits are needed to specify each byte in a 512 byte memory unit?
    5·1 answer
  • Why is it difficult to enforce laws against intellectual theft?
    9·1 answer
  • Declare a char array named line of size 50, and write a statement that reads in the next line of console input into this array.
    6·1 answer
  • Which of the following is a disadvantage of using face-to-face communication over other communication channels? A) There is lag
    13·1 answer
  • What command would you use to add a file to an e-mail message?
    15·2 answers
  • Which of these is not a valid form<br>layout in Microsoft Access?​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!