1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naily [24]
3 years ago
14

Which ITIL process has responsibility in preventing unauthorized access to data? A. Availability Management B. Security Manageme

nt C. IT Service Continuity Management D. Release Management
Computers and Technology
1 answer:
adoni [48]3 years ago
5 0

Answer:

The correct answer for the given question is option(B) i.e  Security Management

Explanation:

Security Management concern with the security it preventing unauthorized access to data it means the authorized user can access the data.

The function of Availability Management is  to check the availability of IT services .It does not preventing unauthorized access so this option(A) is wrong.

The function of  IT Service Continuity Management is to  provide recovery when the Information and communication technology service is damaged.It does not preventing unauthorized access so this option(C) is wrong.

Release Management is not concerning with security it purpose to test the live environment and check that the correct components are released.So option(D) is wrong.

The correct answer is Security Management.

You might be interested in
What is a path and how do you know that it is filled and selected
Shkiper50 [21]

Explanation:

A path represents a selected editing area of an image, this feature is typically available when using Adobe Photoshop software.

For example, a photographer may select the entire face area of his subject as his path (work path). To know when it is filled the photographer observes to see when the colour changes or other changes are applied to the background layer of the selected path.

8 0
3 years ago
Draw a memory map for the following program at the point in the program execution indicated by the comment /*HERE */. In additio
lukranit [14]

Answer:

text   data   bss   dec hex   filename

1857   608   8 2473   9a9   memory-layout

Output of the above Code-

len 3

2

4

200

Explanation:

4 0
3 years ago
When creating an excel budget and performing what-if analysis, it is generally easiest to ______.
Rufina [12.5K]

When creating an Excel budget and performing what-if analysis, it is generally easiest to create the budget with a budgeting assumption tab

  • Assumptions in a budget brings about projections by adding one's assumptions to the current data.

  • It is very important to create a budgeting assumptions tab when creating a master budget in microsoft excel because it will simplifies the process of getting how changes to a master budget's main assumptions influences all cornered schedules and the projected financial statements of said firm.

Conclusively we can say that Excel budget and performing what-if analysis produces the budget with a budgeting assumption tab

Learn more from

brainly.com/question/17198039

4 0
2 years ago
Which of the following are examples of transactional information? A. Airline ticket, sales receipts, and packing slips B. Trends
Elenna [48]

Answer: A) Airline ticket, sales receipts, and packing slips

Explanation:

Transactional information is the data that is used for supporting transaction action of every day in a business unit. This information keeps the record whether the transaction is complete or failed.

  • Example - slip of packing,  sale receipt etc.
  • Other options are incorrect because statistic of sales , spreadsheet ,outcome of sale and projection of growth does not relate with transaction process.
  • Thus, the correct option is option(A).

4 0
4 years ago
To refine the in-between motions, a computer animator uses a mathematical function called a(n)
RoseWind [281]

Answer:

tweening

Explanation:

4 0
4 years ago
Other questions:
  • The Boffo Balloon Company makes helium balloons. Large balloons cost $13.00 a dozen, medium-sized balloons cost $11.00 a dozen,
    13·1 answer
  • What is meant by close to 75% of all viruses is contracted through friendly means?
    8·1 answer
  • C2.5 - A group of four pirates has a treasure chest and one unique lock and key for each pirate. Using hardware that is probably
    6·1 answer
  • I have a class named Counter. In this class I have a synchronized method called countRange(). This method prints out a count in
    10·1 answer
  • What additional information could you add to a sketch to provide other team members with a more accurate design drawing?
    9·1 answer
  • Your job is to write a basic blurring algorithm for a video driver. The algorithm will do the following: it will go through all
    11·1 answer
  • U $ er Ideas for R 0 B 1 0 X?
    12·2 answers
  • When declaring the data type for a multidimensional array of strings, which statement would be most appropriate?
    15·1 answer
  • Give the an example of the following .<br>a.)typing software<br>​
    10·2 answers
  • Q5: what is the difference between a spreadsheet and a relational database? when would you have to use a relational database ins
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!