1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
I am Lyosha [343]
4 years ago
11

The key to security policy is being able to measure compliance against a set of controls. Security controls define _____ ______

you protect the information. The security policies should define ___________ you set the goal.
Computers and Technology
1 answer:
Virty [35]4 years ago
8 0

Answer:

The correct words for the blank spaces are: how; why.

Explanation:

In computer science, security control implies all the efforts of how organizations prevent, detect, and attack risks to safeguard sensitive information. Security policies establish why those actions are taken and set a list of all the assets that must be protected in front of a breach.

You might be interested in
What cell phone technology is the most popular in the united states?
Alchen [17]
IPhone and Android. ....
3 0
3 years ago
Read 2 more answers
Write a MY SQL query to display the name and hire date of all employees who were hired in 1992.
bagirrra123 [75]

Answer:

Select * from Employees where LastName LIKE '%H%' or LastName LIKE '%A%' or   LastName LIKE '%Z%' order by Hiredate(or whatever you put for your year name) desc;

Explanation:

6 0
3 years ago
Why does 5 g mm wave require more cells to achieve a better signal
umka2103 [35]

Answer:

Higher frequencies have a shorter range.

7 0
2 years ago
Who needs to be involved when assembling business solutions that include hardware and software?
sveta [45]
Software engineer i would say
5 0
3 years ago
Read 2 more answers
Someone knows a good compiler for iPad? It has to be an app
aksik [14]
Jedona is a good one
5 0
3 years ago
Other questions:
  • What sequence is used to create a brochure document from a template?
    8·2 answers
  • The first electronic networking technology widely used in the United States was the:
    6·1 answer
  • What’s of the following can be used to visually represent information similar to diagrams format painter Helens smart are a clip
    8·1 answer
  • How can our perceptions help us to choose the channel for our message?
    5·1 answer
  • What is a pin? part of a connector a port part of a cable a NIC
    14·1 answer
  • 1. Why is it important for IT technicians to keep documentation on computers for which they are
    13·1 answer
  • Is an applications program is a program designed to perform a specific task for specific users
    5·1 answer
  • Write c++ program from 1to 100 to find prime numbers using statement.<br><br>please help me​
    15·1 answer
  • What Microsoft feature enables you to represent text as colorful visuals
    12·1 answer
  • Which statement best characterizes under what circumstances you should add your social media profile to a resume? You should add
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!