1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VladimirAG [237]
2 years ago
13

Jacob holds a Computer Hacking Forensic Investigator (CHFI) certification. Which of the following responsibilities should Jacob

have the ability to perform?
1 Measure ethical hacking
2 Identify intruder footprints
3 Develop cybersecurity law
4 Manage risk mitigation

Which of the following positions is suitable for a person who holds a Certified Information Systems Security Professional (CISSP) certification?

1 Chief Information Security Officer
2 Security or Network Architect
3 All of positions would be suitable
4 Director of Security

Which of the following cybersecurity frameworks strive to improve the infrastructure of an organization’s cybersecurity practices by providing standard methods and processes for combatting attacks?

1 SAFETY Framework
2 NIST Framework
3 Organization of Cybersecurity 27005
4 Payment Card Industry Data Security Standard (PCI DSS)
Computers and Technology
2 answers:
Katen [24]2 years ago
6 0

Answer:

the answers too the questions are B. identify intruder footprints,

B. Nist framework D. Director of security,

nadya68 [22]2 years ago
3 0

Answer:

the answers too the questions are B. identify intruder footprints,

D. Director of security, and B. Nist framework

Explanation:

You might be interested in
What is the function of ROM?
Gnoma [55]

Answer:

Hello, There!

<h2>Your Question↓</h2>

What is the function of ROM?

<h2>Answer↓</h2>

Allows parts of the computer to communicate is the Correct Answer.

Explanation:

<h2>Now you May Ask What does it do or How it works↓</h2>
  • ⇒ROM provides the necessary instructions for communication between various hardware components.
  • ⇒ it is essential for the storage and operation of the BIOS, but it can also be used for basic data management, to hold software for basic processes of utilities.

Tip: Wanna know how to earn points back for asking your Question?

If you do it's easy just when two people answer your question whichever answer you think is the best click the crown on the side to get 25% of your points back! :D

Therefore, I hope this helps!

6 0
2 years ago
Which of the following statements is true of a cookie? a. A cookie can create copies of itself and spread to other networks to e
Ilya [14]

Answer: D.

Data about user preferences and activity is captured and stored under a cookie on a company’s Web server.

Explanation: The most common and best-known technology for user tracking is the use of cookies. Other known online website tracking tools are tracking pixels (or pixel tags), web beacons (or ultrasound beacons), and browser fingerprinting (or digital fingerprinting), amongst others.

a cookie will contain a string of text that contains information about the browser. To work, a cookie does not need to know where you are from, it only needs to remember your browser. Some Web sites do use cookies to store more personal information about you.

8 0
3 years ago
Question # 4
arlik [135]

Answer:

Explanatio Morse code

4 0
3 years ago
When using the Common Internet File System (CIFS), which security model will require network users to have a user name and passw
hjlf

Answer:

User-level Security

Explanation:

User-level security allows the user to access resources on a network using a username and password. User-level security offers higher and greater security than share-level security, which does not require a password to access files.

User-level security allows the database user access and permission to resources.

4 0
3 years ago
Why is group design better or worse for coding projects ?....will report for a dum answer U ` U
DedPeter [7]

there are many styles of coding think about it like art if you had 15 painters working on the same 4x4 painting it would look like a mess.

-scav

8 0
3 years ago
Other questions:
  • What folder holds 32-bit programs installed in a 64-bit installation of windows?
    12·1 answer
  • In which scenario would instant messaging be more useful than other forms of communication?
    10·1 answer
  • What type of device can be used to block unwanted traffic initiated from the internet and can also restrict internet access from
    6·1 answer
  • fill down feature on a formula and you need to keep a cell reference the same which one will allow you to keep the same cell ref
    15·1 answer
  • What Word feature is seen below?
    10·1 answer
  • Good ways to increase sales on phone accesories?
    10·2 answers
  • The show ip dhcp binding command displays _____. (Points : 5) the MAC table cache information
    7·1 answer
  • Write code which takes inputs and creates two Rectangle objects (using the edhesive.shapes.Rectangle class) and compares them us
    7·1 answer
  • Subscribe too my you tube channel for a brainiest
    15·1 answer
  • Select the three concepts of capital outlay.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!