1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
I am Lyosha [343]
4 years ago
11

The key to security policy is being able to measure compliance against a set of controls. Security controls define _____ ______

you protect the information. The security policies should define ___________ you set the goal.
Computers and Technology
1 answer:
Virty [35]4 years ago
8 0

Answer:

The correct words for the blank spaces are: how; why.

Explanation:

In computer science, security control implies all the efforts of how organizations prevent, detect, and attack risks to safeguard sensitive information. Security policies establish why those actions are taken and set a list of all the assets that must be protected in front of a breach.

You might be interested in
Which data type is also called a binary object?
Leno4ka [110]
For Plato users it's 
2. BLOb
4 0
3 years ago
What is motherboard ?​
PtichkaEL [24]

Answer:

A motherboard is the main printed circuit board in general-purpose computers and other expandable systems. It holds and allows communication between many of the crucial electronic components of a system, such as the central processing unit and memory, and provides connectors for other peripherals

4 0
3 years ago
The best description of a propriety database
Nikolay [14]
A proprietary database is a database that is privately owned and password protected. i hope this helps!!!! :)
6 0
4 years ago
I'm trying to self teach myself c# coding language any tips or advice
Kaylis [27]

Answer:

Dont give up lol

Explanation:

8 0
3 years ago
How can a vpn make use of connection types that include multiple channels, and allow for multilink connections?
horsena [70]

Multilink<u> </u>and Bandwidth Allocation Protocol  can a vpn make use of connection types that include multiple channels, and allow for multilink connections

Bandwidth Allocation Protocol (BAP) generally manages the total number of links in a multilink bundle. It is especially valuable to different operations that usually contain carrier charges based on bandwidth utilization.

<h3>What is bandwidth allocation?</h3>

Bandwidth allocation is the process of assigning radio frequencies to different applications. The radio spectrum is a finite resource, which means there is great need for an effective allocation process.

To learn more about Bandwidth allocation, refer

brainly.com/question/14617183

#SPJ4

4 0
2 years ago
Other questions:
  • Why are computer manufacturers constantly releasing faster computers? how do computer users benefit from the increased speed?
    7·1 answer
  • What is the purpose of the operating systems processor management function
    7·1 answer
  • We will pass in 2 values, X and Y. You should calculate XY XY and output only the final result. You will probably know that XY X
    13·1 answer
  • Why are modern manufacturing techniques preferred over those historically used by artisans?
    13·1 answer
  • How are a normal video updater and a 3-D graphics updater Alike? how are they different?
    14·1 answer
  • How many invalid code sequences can we have in 5b/6b encoding?
    15·1 answer
  • a machine needs a minimum of 100 sec to sort 1000 names by quicksort what is the approximate worst case time needed to sort 100
    13·1 answer
  • Sensory cues are used for script writers to be able to get more creative with the story their are scripting for (i.e.
    15·1 answer
  • PLEASE ASAP!!
    9·2 answers
  • Which of the following is a good design tip.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!