1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VladimirAG [237]
2 years ago
13

Jacob holds a Computer Hacking Forensic Investigator (CHFI) certification. Which of the following responsibilities should Jacob

have the ability to perform?
1 Measure ethical hacking
2 Identify intruder footprints
3 Develop cybersecurity law
4 Manage risk mitigation

Which of the following positions is suitable for a person who holds a Certified Information Systems Security Professional (CISSP) certification?

1 Chief Information Security Officer
2 Security or Network Architect
3 All of positions would be suitable
4 Director of Security

Which of the following cybersecurity frameworks strive to improve the infrastructure of an organization’s cybersecurity practices by providing standard methods and processes for combatting attacks?

1 SAFETY Framework
2 NIST Framework
3 Organization of Cybersecurity 27005
4 Payment Card Industry Data Security Standard (PCI DSS)
Computers and Technology
2 answers:
Katen [24]2 years ago
6 0

Answer:

the answers too the questions are B. identify intruder footprints,

B. Nist framework D. Director of security,

nadya68 [22]2 years ago
3 0

Answer:

the answers too the questions are B. identify intruder footprints,

D. Director of security, and B. Nist framework

Explanation:

You might be interested in
_____ includes a wide range of applications, practices, and technologies for the extraction, transformation, integration, analys
Alla [95]

Answer:

The answer is "Option a".

Explanation:

The B.I. is a method, methodology, software, and development set that makes raw data usable and relevant, which facilitates improved decision-making and competitive opportunities, and certain choices were wrong, which can be described as follows:

  • In option b, The A.I is uses in the machines, that's why it is not correct.
  • In option c, It is used to analyze the data, which used in business. that's why it is not correct.
  • In option d, It is wrong, because it a part of A.I.
6 0
3 years ago
Power point how to insert diamond symbol
IceJOKER [234]
You got to "insert" and then you go to "shapes" and then you find the symbol you like and you drag and drop it onto the page. Then you can resize to the size and angle you would like it at.
4 0
3 years ago
Atieno is a musician who records music on her computer. Which devices do you think she would need the most?
AURORKA [14]

Answer:

Midi Synthesizer, Mic,Boom Mic, Laptop

Explanation:

At the end of the day a keyboard and a pc is all you need as the keyboard alone can cover nearly any instrument.

8 0
3 years ago
Who is known as the father of computer? ​
juin [17]

Answer:

Charles babbage ok my boy

8 0
3 years ago
Read 2 more answers
-Give a definition of the critical section problem and explain the purpose of the entry and exit code blocks
Alisiya [41]

Answer: In operating system a code segment which accesses  some shared variables or resources one at a time atomically such other no other code or process is accessing that resource or variable at the same time.

Entry section code block allows the access to the shared resource or variable and exit section code signals the termination from access to the shared resource or variable.

Explanation:

Entry and exit section codes needs to check certain properties before allowing the access and removal of access to a particular code segment.

These conditions are:

1. Bounded waiting.

2. Mutual exclusion.

3. checking thread execution status to allows other threads to enter the critical section (CS).

6 0
3 years ago
Other questions:
  • Additional chemical hazards training must be provided to employees:
    12·1 answer
  • The family size bottle of sunscreen holds 121212 fluid ounces (\text{fl oz})(fl oz)(, start text, f, l, space, o, z, end text, )
    12·1 answer
  • Which of these are examples of a bug?
    6·1 answer
  • A network administrator determines who may access network resources by assigning users
    10·1 answer
  • Climatologist use weather balloons, stethoscopes, and satellites true or false
    14·1 answer
  • Write a function (subroutine) that inputs a data value in register r0 and returns value in r0. The function returns y 5 a 1 bx 1
    15·1 answer
  • Python will ignore any line of code that begins with hashtag true or false​
    13·2 answers
  • What is the minimum number of bits you would need to represent a number on a 0 to 10 scale
    15·1 answer
  • What steps can you take to secure your private information?.
    8·1 answer
  • How are the waterfall and agile methods of software development similar?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!