1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nalin [4]
2 years ago
5

________ helps in determining the cause of a security threat in an incident response plan. Question 7 options: A) Restricting sy

stem access B) Investigating system logs C) Reevaluating the risk matrix D) Taking systems offline
Computers and Technology
1 answer:
andrew-mc [135]2 years ago
3 0

Investigating system logs helps in determining the cause of a security threat in an incident response plan.

<h3>What do system logs works for?</h3>

A system log is known also as syslog. This is known to be that part of a system that tells or show the  records of all the actions that takes place in an operating system.

Conclusively, the Investigating system logs helps in determining the cause of a security threat in an incident response plan because it will tell all of the startup messages, system changes and other processes that took place in the system.

Learn more about security threat from

brainly.com/question/25758530\

#SPJ1

You might be interested in
PLEASE PLEASE PLEASE PLEASE HELP ASAP!!!!! I PROMISE I WILL GIVE YOU A BRAINLIEST FOR THE CORRECT ANSWER PLEASE HELP!!
inysia [295]
The answer will be C

As she is about to leave the position, in account of professionalism, she should NOT do any unnecessary harm to the current company, and  she should notify the company for necessary description before leaving. 
5 0
3 years ago
Read 2 more answers
Write the statements needed so that the variable secondWord is associated with the second word of the value of sentence . So, if
professor190 [17]

Answer:

Explanation:

String str = "Broccoli is delicious.";

String[] Secondstr = str.split(" ");

System.out.println("second word is " + Secondstr[1]);

3 0
3 years ago
Can anyone suggest me any good complete isekai anime..​
Fofino [41]
I suggest you watch hentaaii my boyy


8 0
2 years ago
Read 2 more answers
Describe the difference between Global knowledge and personal idea. Why is it important to give credit to others by citing their
sergejj [24]

Global knowledge is like common sense, people know these things, but their may be someone else with the same idea. One person can come up with the idea but their is also another with same so don't give someone to much credit.

7 0
3 years ago
A computer record is used to store all the information about one transaction, but several such records must be used to store the
never [62]

Answer:

True

Explanation:

A single file can be used to record/ store all the information regarding a transaction because in a transaction there are less complexities. a  simple transaction involves an exchange/communication between a buyer and a seller which involves exchange in finances between the buyer and the seller.  

An employee can be involved in several activities like work activities and multiple transactions while a single inventory part record is different from an employee's record and  any other form of transaction. hence separate files have to be created for each of these activities.

To have an easy access to this information when needed a master file is created to store all the individual files.

7 0
3 years ago
Other questions:
  • Write algorithm to find (a+b)^2=(a+b)*(a+b)​
    9·1 answer
  • The process of encoding messages or information in such a way that only authorized parties can read it is called ____________.
    7·1 answer
  • ________ is a dedicated device designed to manage encrypted connections established over an untrusted network such as the Intern
    12·1 answer
  • One of the first signals that an organization is making progress in the development of its IR program, specifically in the devel
    6·1 answer
  • VOTE!
    11·1 answer
  • Describe how you would create a Java program that prompted the user to correctly enter a username and password. The username is
    7·1 answer
  • Which century saw the development of letterpress printing?
    10·1 answer
  • Example of Not a computer characteristics example
    12·1 answer
  • ❤️❤️Please answer the six questions ✨BRAINIEST✨ For correct answer ❤️❤️
    7·1 answer
  • Explain how to add cell A1 and cell B3 in excel
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!