1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tom [10]
3 years ago
9

SP 800-14, Generally Accepted Principles and Practices for Securing Information Technology Systems, provides best practices and

security principles that can direct the security team in the development of a security ________.
Computers and Technology
2 answers:
melamori03 [73]3 years ago
8 0

Answer:

The answer is blueprint.

Refer below for explanation.

Explanation:

Blueprint ia a guide that is made for something else, so it was originally made to copy.

Alika [10]3 years ago
3 0

Answer:

blueprint.

Explanation:

Generally Accepted Principles and Practices for Securing Information Technology Systems, provides best practices and security principles that can direct the security team in the development of a security blueprint.

You might be interested in
IT professionals have a responsibility to educate employees about the risks of hot spots. Which of the following are risks assoc
kodGreya [7K]

Answer:

third partying and computer hackers.

Explanation:

7 0
4 years ago
Cyber security includes which of the following?
Law Incorporation [45]

Answer:

d. All of above

Explanation:

All answers are correct!

5 0
4 years ago
Camille prepared excellent PowerPoint slides for her speech about education reform, but the speech didn't go as well as she had
Elanso [62]

Answer:

The answer is "she uses the keyboard unless she could quickly progress the slides".

Explanation:

Planning is the single least key aspect of having the performance effectively. It is a critical foundation and which can dedicate much space as possible to it and avoids loopholes.  

  • It is the proper planning that may also ensure, that you have fully considered.  
  • It is the thing, which we need to convey into your delivery and will also help to boost your trust.
6 0
3 years ago
When an important file is saved on two different computers, what is the name of the file that is housed on the second computer?
OleMash [197]
When an important file is saved on two different computers, the name of the file that is housed on the second computer is 'back up'. Back up refers to the process of copying and archiving a particular computer data in order to have an extra copy to fall back on in the event of data loss.  <span />
5 0
3 years ago
The acronym LAH stands for
Nina [5.8K]
D.Limited Access Highway
5 0
4 years ago
Read 2 more answers
Other questions:
  • If you quote an author from a website in a paper, it will be important to create a _____ in your writing to give them credit for
    7·2 answers
  • What is the magnitude of the largest positive value you can place in a bool? a char? an int? a float?
    14·1 answer
  • Which statement is true? Group of answer choices Variables cannot be assigned and declared in the same statement Variable names
    5·1 answer
  • What are the cause of eye strain during computer usage?
    7·1 answer
  • You are asked to check your company’s configurations to determine if any filters should be built to stop certain ICMPv6 traffic.
    9·1 answer
  • Lasses give programmers the ability to define their own types. <br><br> a. True<br> b. False
    10·1 answer
  • What does command do
    5·1 answer
  • Function of pons for class 7​
    15·1 answer
  • How will you maintain electrical tools and equipment?
    12·2 answers
  • Spreadsheets are sometimes credited with legitimizing the personal computer as a business tool. Why do you think they had such a
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!