1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tom [10]
3 years ago
9

SP 800-14, Generally Accepted Principles and Practices for Securing Information Technology Systems, provides best practices and

security principles that can direct the security team in the development of a security ________.
Computers and Technology
2 answers:
melamori03 [73]3 years ago
8 0

Answer:

The answer is blueprint.

Refer below for explanation.

Explanation:

Blueprint ia a guide that is made for something else, so it was originally made to copy.

Alika [10]3 years ago
3 0

Answer:

blueprint.

Explanation:

Generally Accepted Principles and Practices for Securing Information Technology Systems, provides best practices and security principles that can direct the security team in the development of a security blueprint.

You might be interested in
Implementing the following object oriented programming constructions.1. Member FunctionsReplace the eight supporting output func
leonid [27]

Answer:

OMG i can't read that.

Explanation:

4 0
3 years ago
What difficulties would a user face when using a computer without an operating system
attashe74 [19]

Answer:

The user would not be able to access programs easily and would not be able to connect to internet and perform necessary tasks

Explanation:

7 0
2 years ago
Users who are connecting to an NLB cluster have been complaining that after using the site for a few minutes they are prompted t
Yanka [14]

Answer:

The answer is "Set the cluster affinity to Single"

Explanation:

The client connectivity to the data source, the user affinity is defined. If client affinity is specified, requests from either a given client link were spread in a data source set to a specified source. We must adjust the cluster affinity in single to solve this problem and maintain their scalability. Your customer does not have to authenticate repeatedly. This helps to send all transactions to a single node from an IP address.

8 0
3 years ago
A10:A20 Refer to values in
Keith_Richards [23]
The range of cells in column A and rows 10 through 20
8 0
3 years ago
A ___________ variable is declared outside all functions.
velikii [3]

Answer:

B. global

Explanation:

A global variable lives on even when a function returns.

7 0
4 years ago
Other questions:
  • 2- There are many different design parameters that are important to a cache’s overall performance. Below are listed parameters f
    11·1 answer
  • True or False<br>-275+406-325=275+(-325)+406
    6·2 answers
  • HELP ASAP!!! 100 POINTS
    9·2 answers
  • What is the trade-offs in time complexity between an ArrayList and a LinkedList?
    7·1 answer
  • Which creepy character is a user-generated myth in minecraft
    13·1 answer
  • We are continuously sending and receiving messages that may change midstream. This illustrates that____________.
    15·1 answer
  • When using bits to represent fractions of a number, can you create all possible fractions? Why or why not?
    13·1 answer
  • If a employee has a grade grater than or equal to 18, then he she will get 50% bonous on the basic pay. Otherwise, the employee
    5·1 answer
  • Drow flowchart that finds a<br> series between 10, 100<br> fibonanchi
    6·1 answer
  • Directions Interview your parent or any member of your family. Identity
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!