1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mel-nik [20]
3 years ago
10

In which contingency plan testing strategy do individuals participate in a role-playing exercise in which the CP team is present

ed with a scenario of an actual incident or disaster and expected to react as if it had occurred? a. desk check b. structured walk-through c. parallel testing d. simulation
Computers and Technology
2 answers:
Alika [10]3 years ago
6 0

Answer:

b. structured walk-through

Explanation:

  A structured walkthrough is an activity that involves analyzing a system to make sure it meets functional and nonfunctional requirements. Already Validation, is the certification that the system meets customer needs and expectations. The Validation and Verification process are not separate and independent processes.

vesna_86 [32]3 years ago
4 0

Answer:  B. structured walk-through

You might be interested in
An example of a(n) ____ reconnaissance attack is a user who sends SQL injections to a system in hopes of generating some type of
Elden [556K]
The answer to this question is A
7 0
3 years ago
Read 2 more answers
Suppose there are two ISPs providing WiFi service in a café. Each ISP operates its own AP and has its own IP address block. If b
Alinara [238K]

Answer:

As a design rule, access points within range of each other should be set to channel frequencies with minimal signal overlap. Users will find that roaming doesn’t work well, and performance will degrade because of interference between access points.

Explanation:

8 0
4 years ago
Read "Penetration Testing – Reconnaissance with NMAP Tool," located within the required readings. In the article, the authors di
steposvetlana [31]

Answer:

Check the explanation

Explanation:

The two tools that are utilized for consideration in cyber attacks are operating systems and computer systems. The operating system Kali Linux 2.6 3.x Mix (64-bi) and windows XP SPO (32-bit).

Penetration testing is a very important technique or procedure in auditing the loopholes and security in a particular operating system. The computer systems are Nmap and VMware. The author posit that VMware is a virtual machines programming that gives a virtual PC the capacity for more than one event or action of the working frameworks to keep cunning one similar server.

Nmap (“Network Mapper”) according to the authors, it is a free and open source utility for system reviewing and security. these tools are used for the purpose of finding an open port and to also gain access while another considers the vulnerabilities of the operating system.

ALL together these tools assist in building the foundation for ethical hacking. Using Nmap allows a hacker to gain access to the system thereby seeing all the flaws to actively peruse that account. All these tools work together for a successful hacking process and procedures.

5 0
3 years ago
The process that prepares a data model for implementation as a simple, nonredundant, flexible and adaptable database is known as
Vera_Pavlovna [14]

Answer:

The process that prepares a data model for implementation as a simple, nonredundant, flexible and adaptable database is known as

C) data analysis.

Explanation:

Data analysis is a process used in critically examining, evaluating data by using logical and statistical techniques.

Data analysis helps in the discovery of important information, data that can be used in the final decision making. the types of data analysis we have are:

*Prescriptive Analysis.

*Descriptive Analysis.

*Predictive Analysis.

*Diagnostic Analysis.

3 0
3 years ago
Read 2 more answers
Option A requires two years of higher education and $15,000, while option B
valina [46]
A ;mo 6 is more than 2 and 75000 is more than 15000
6 0
3 years ago
Other questions:
  • Write a program that requires the user to enter two floating-point numbers (num1 and num2) from the keyboard. Multiply them and
    6·1 answer
  • A ____________________ can be used to hierarchically represent a classification for a given set of objects or documents. A. taxo
    10·1 answer
  • Refers to the programs or instructions used to tell the computer hardware what to do.
    8·1 answer
  • a user has a large amount of data that she or he needs to store. the data will not be accessed regularly, but still needs to be
    5·2 answers
  • What is it called when two different files generate the same hashing result?
    15·1 answer
  • Moving laterally within a network once an initial exploit is used to gain persistent access for the purpose of establishing furt
    10·1 answer
  • What does CS mean? idk
    14·2 answers
  • I will give brainliest!!!
    13·1 answer
  • What is Data rate?<br> What is BAUD RATE?<br> What is bandwidth?
    8·1 answer
  • Why does python code generate fewer types of syntax errors than code in other programming languages?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!