1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dimaraw [331]
3 years ago
15

An organization is implementing a preselected baseline of security controls, but finds not all of the controls apply. What shoul

d they do?A. Implement all of the controls anyway.B. Identify another baseline.C. Re-create a baseline.D. Tailor the baseline to their needs.
Computers and Technology
1 answer:
WINSTONCH [101]3 years ago
8 0

The answer is Tailoring the baseline to their needs.

After an organization selects applicable security control baseline but finds not all of the controls apply, it initiates a tailoring process to modify the controls appropriately and more closely with specific conditions related to organizational missions, information systems or environments of operation. It is an integral part of the security control selection and specification and involves risk management processes like assessing, responding to, and framing.

You might be interested in
Identify way in which computer are used in personnel management
Lyrx [107]

The main roles of computer in human resource management are decreasing time complexity, flexibility, record keeping problem etc. HRM system process lots of data everyday with the help of computer. This data processed easily without any fear of data loss so computer a vital role in human resource management system. The usage of computer in human resource management can be usually referred to as management information system. It can also be called as human resource information system. Usually what a computer does, it converts all the data or we can say raw data into meaningful and usable information required by the manager to take decisions, and for planning and control.

please I need brainliest thanks

I hope this helps

4 0
3 years ago
Read 2 more answers
write an assembly language procedure that also performs the binary search. The C program will time multiple searches performed b
laiz [17]

Answer:

Let’s identify variables needed for this program.

First variables will be the one which will hold the values present in the Given Numbers in Array list and key of 16-bit and it will be array ARR and KEY. variables will be holding the Messages MSG1 “KEY IS FOUND AT “, RES ”  POSITION”, 13, 10,” $” and MSG2 ‘KEY NOT FOUND!!!.$’ to be printed for the User. Other variables will be holding Length of the Array and it will be LEN, So in all Six variables.

The identified variables are ARR, KEY, LEN, RES, MSG1 and MSG2.

DATA SEGMENT

    ARR DW 0000H,1111H,2222H,3333H,4444H,5555H,6666H,7777H,8888H,9999H

    LEN DW ($-ARR)/2

    KEY EQU 7777H

    MSG1 DB "KEY IS FOUND AT "

    RES DB "  POSITION",13,10," $"

    MSG2 DB 'KEY NOT FOUND!!!.$'

DATA ENDS

CODE SEGMENT  

   ASSUME DS:DATA CS:CODE

START:

     MOV AX,DATA

     MOV DS,AX

   

     MOV BX,00

     MOV DX,LEN

     MOV CX,KEY

AGAIN: CMP BX,DX

      JA FAIL

      MOV AX,BX

      ADD AX,DX

      SHR AX,1

      MOV SI,AX

      ADD SI,SI

      CMP CX,ARR[SI]

      JAE BIG

      DEC AX

      MOV DX,AX

      JMP AGAIN

BIG:   JE SUCCESS

      INC AX

      MOV BX,AX

      JMP AGAIN

SUCCESS: ADD AL,01

        ADD AL,'0'

        MOV RES,AL

        LEA DX,MSG1

        JMP DISP

FAIL: LEA DX,MSG2

DISP: MOV AH,09H

     INT 21H

     

     MOV AH,4CH

     INT 21H      

CODE ENDS

END START

In this Assembly Language Programming, A single program is divided into four Segments which are 1. Data Segment, 2. Code Segment, 3. Stack Segment, and 4. Extra  Segment. Now, from these one is compulsory i.e. Code Segment if at all you don’t need variable(s) for your program.if you need variable(s) for your program you will need two Segments i.e. Code Segment and Data Segment.

Explanation:

The attached Logic is a C like Program to conduct a binary search we need small Algorithm Shown above in a very simple way, So Just we will covert the logic into Assembly There are many things uncommon in the programing Language. There are No While Loops or Modules but this things are to be implemented in different ways.

6 0
3 years ago
How to connect to the internet through another computer?
Yuri [45]
You go to settings , go to wifi, click on your wifi server, type in password, and your in! or if you mean like going on google, you just click an icon named google, Yahoo, msn, ect...
6 0
3 years ago
A(n) ____ database is an application appropriate for an object-oriented database that contains text links to other types of docu
iogann1982 [59]
A(n) "Hypertext" database is an application appropriate for an object-oriented database that contains text links to other types of documents
4 0
3 years ago
Which technological innovations along history allowed the appearance of the computer
mihalych1998 [28]

Answer:

The first major effect the Industrial Revolution had on the environment was caused by the increased use of fossil fuel, first coal and then oil.

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • Airbags only absorb the _____ impact in a crash. initial final mid-stage smallest
    13·1 answer
  • Andy wants to touch up his holiday photographs because they appear too bright and the color is washed out. Which software applic
    14·1 answer
  • A text-only forum accessed through a bulletin board service (BBS) is known as a _____.
    12·1 answer
  • An organization’s IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the
    5·1 answer
  • When you use the ip address of the web server, the correct site is displayed?
    15·1 answer
  • If I make a Zoom Meeting, would you join it?
    7·2 answers
  • Hello, can you help me answer these questions?
    9·2 answers
  • If a computer is capable only of manipulating and storing integers, what di themselves? How are these difficulties overcome
    13·1 answer
  • In most software packages, the function key F1 is used to run the _____program.
    10·1 answer
  • Escribe un ejemplo de:• Software de aplicación. • Software de diagnóstico. • Software de sistema. ayudenme plis, me toca entrega
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!