1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nalin [4]
2 years ago
5

________ helps in determining the cause of a security threat in an incident response plan. Question 7 options: A) Restricting sy

stem access B) Investigating system logs C) Reevaluating the risk matrix D) Taking systems offline
Computers and Technology
1 answer:
andrew-mc [135]2 years ago
3 0

Investigating system logs helps in determining the cause of a security threat in an incident response plan.

<h3>What do system logs works for?</h3>

A system log is known also as syslog. This is known to be that part of a system that tells or show the  records of all the actions that takes place in an operating system.

Conclusively, the Investigating system logs helps in determining the cause of a security threat in an incident response plan because it will tell all of the startup messages, system changes and other processes that took place in the system.

Learn more about security threat from

brainly.com/question/25758530\

#SPJ1

You might be interested in
Heelp my brainly stuff says i am 49 but im 11 how to fix?X??
stich3 [128]

Make another account. But u cant get into brainly unless u r over 26 or something.

6 0
3 years ago
The columns of a spreadsheet data source are A. form letters. B. the mailing list. C. data points. D. fields.
mojhsa [17]

I believe it is C, I'm so sorry if im incorrect.

8 0
3 years ago
What is a mask used for? What is a format used for? Which can affect the way that data is stored?
scoray [572]

Answer:

 Mask is the process of replacing and changing the sensitive information and data element from the stored data so, the given structure in the data remain the same while the data itself change for protecting the sensitive information or data in the system.

This process is commonly known as data masking. The main purpose of mask is that it protecting the information or data.  

Format is the process of specify the bits for using in the digital storage and it is mainly used for encoding the information and data. It basically designed for formatting the document so that it can store in the media with the proper format in the computer system.

3 0
4 years ago
A _____ site gathers and organizes Web content, and may automatically downloads updates to subscribers.
Darina [25.2K]

A company website or a .com website could have content that might automatically download. I hope this helped.

8 0
4 years ago
A person or company that pays you to do something for them is your _____.
Andrew [12]

Answer:

client

Explanation:

client is someone that needs help

6 0
3 years ago
Read 2 more answers
Other questions:
  • Andy, a developer, is designing a new program. Which tool should Andy use to help him complete his task?
    6·1 answer
  • Kwan is using JavaScript extensively to add interactivity to his Web site. Contained within his script is a counter object that
    8·1 answer
  • Can you use a backup camera when you take your drivers test
    9·1 answer
  • Moore's Law states that the processing power of the latest computer chips doubles about every eighteen months. Assuming the grap
    6·1 answer
  • What are the three types of mergers?
    8·1 answer
  • Write a loop that reads positive integers from standard input and that terminates when it reads an integer that is not positive.
    8·1 answer
  • Help mah!!! T^T please and thank you mate
    5·2 answers
  • Modify your previous exercise to determine if the user can ride a rollercoaster. To ride the rollercoaster, you must be at least
    12·1 answer
  • Which one of these is NOT an indicator that an email is spam?
    5·1 answer
  • HELP MEEE PLEASE!!!
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!