1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maks197457 [2]
4 years ago
5

In addition to compiling the list of user access requirements, applications, and systems, the BIA also includes processes that a

re ____________. These processes safeguard against any risks that might occur due to key staff being unavailable or distracted.
Computers and Technology
1 answer:
laila [671]4 years ago
5 0

Answer:

automated

Explanation:

Basically a Business Impact Analysis (BIA) estimates and determines the effects of a business activity and process disturbances. These disruptions can be natural or electronic disasters. It also collects information which is used to establish recovery plan. It identifies the business vulnerabilities and works on the strategies in order to reduce such potential hazards. The BIA involves both manual and automated processes. BIA involves automated processes which include the automated software tools that enables the protection of the confidential information of the users and also generates automated reports about the critical business processes.

You might be interested in
What is the khan academy game where it is a block having to jump over lava and is an endless runner
saw5 [17]

Answer:https://www.khanacademy.org/computer-programming/lava-the-impossible-game-by-swax97/4638717300965376/embedded?id=1436456095000-0.5&origin=undefined&buttons=yes&embed=yes&editor=no&author=yes

Explanation:

5 0
3 years ago
Which type of vulnerability scan mimics the work of a threat actor who has already exploited a vulnerability and compromised cre
Vilka [71]

There are different type of vulnerability scan. The type of vulnerability scan mimics the work of a threat actor is called Credential Vulnerability Scan.

Credential Vulnerability Scan is known to be a scan in which there is a valid authentication of credentials Example are usernames and passwords etc. are known to be supplied to the vulnerability scanner to mimic the work of a threat actor that has these credentials.

They are known to be very slow but can give an in-depth insight into the system by accessing a wide range of the installed software  

Learn more from

brainly.com/question/14728460

5 0
3 years ago
Why is it important to carefully order events in a personal narrative?
Anna11 [10]

Why is it important to carefully order events in a personal narrative? because it strengthens the effect the beginning will have on readers, enabling them to relate to the experience because sequencing events in a way that makes sense will keep readers engaged and enable the story to have a strong impact because it will help the ending make more sense if the beginning and the middle are well written with many sensory details because the beginning sets the stage for everything that will be shown first

Hope this helps :)

3 0
4 years ago
Microsoft Paint can be described as a digital sketch pad ?
alexira [117]
Yes I can be be a digital sketch pad

HOPE THIS HELPS!!!!!!!
4 0
3 years ago
The process of __________ encourages members to accept responsibility for the outcomes of a group and for changing the style in
soldier1979 [14.2K]

Answer:

The correct answer to the following question will be Option B (Interpersonal feedback).

Explanation:

  • Interpersonal feedback seems to be a mechanism under which someone talks. Individuals deliver a message regarding their sensations and expectations of actions by another.
  • It encourages employees to take obligation for a group's results and to change the look they correspond to many other people in.

Therefore, Interpersonal feedback is the right answer.

8 0
3 years ago
Other questions:
  • After Intel faced strong shifts in technologies, such as cloud services, social networking, mobile devices, etc., Intel realized
    11·1 answer
  • To help determine which technology to use, Raul creates a table to help him compare the pros and cons of his choices. What part
    15·1 answer
  • Using physical proximity to gain login information, passwords, or other personal information is known as a(n) ____.
    7·1 answer
  • A Use-Case diagram is a staticdiagram?
    7·1 answer
  • Given a double variable named areaofsquare write the necessary code to read in a value , the area of some square, into areaofsqu
    9·1 answer
  • What does the /var directory contain?
    7·1 answer
  • A(n) _____ is a network connection device that can build tables that identify addresses on each network.
    10·1 answer
  • Which statement describes the Direction option for animations and transitions?
    5·2 answers
  • Help fast fast anyone
    10·1 answer
  • When can screentips be useful? when finding a tab when looking for a command when pinning the ribbon when using a command.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!