1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dimaraw [331]
3 years ago
15

An organization is implementing a preselected baseline of security controls, but finds not all of the controls apply. What shoul

d they do?A. Implement all of the controls anyway.B. Identify another baseline.C. Re-create a baseline.D. Tailor the baseline to their needs.
Computers and Technology
1 answer:
WINSTONCH [101]3 years ago
8 0

The answer is Tailoring the baseline to their needs.

After an organization selects applicable security control baseline but finds not all of the controls apply, it initiates a tailoring process to modify the controls appropriately and more closely with specific conditions related to organizational missions, information systems or environments of operation. It is an integral part of the security control selection and specification and involves risk management processes like assessing, responding to, and framing.

You might be interested in
The term ____ refers to the use of a single unifying device that handles media, internet, entertainment, and telephone needs.Dig
Genrish500 [490]

Answer:

The answer IS digital convergence.

Explanation:

6 0
1 year ago
What are the steps to configure user information in a document?
chubhunter [2.5K]

Answer:

file, properties, options, general

Explanation:

4 0
2 years ago
Read 2 more answers
Francis has designed a picture book appropriate for third graders. He wants teachers across the world to freely download use, an
mestny [16]

Answer:

The correct answer will be "Project Gutenberg".

Explanation:

  • Project Gutenberg continues to obtain lots of requests for authorization for using printed books, pictures, as well as derivatives from eBooks. Perhaps some applications should not be produced, because authorization would be included in the objects provided (as well as for professional usages).
  • You can copy, hand it over, or m actually-use it underneath the provisions including its license that was included in the ebook.

So that the above is the right answer.

8 0
2 years ago
A computer essentially takes input, processes it, and produces output. Which person developed a machine in the mid-1880s that ac
MakcuM [25]

Answer:

The answer to this question is given below in the explanation section. the correct answer is Herman Hollerith.

Explanation:

Charles Babbage (incorrect)

Charles Babbage considers the father of the digital computer. He was a mathematician, philosopher, inventor, and mechanical engineer, Babbage originated the concept of a digital programmable computer. But he died on 18 1, 1871. so, this option is not correct.

John William Mauchly (Incorrect)

John William Mauchly was an American physicist who, along with J. Presper Eckert, designed ENIAC, the first general purpose electronic digital computer, as well as EDVAC, BINAC and UNIVAC I, the first commercial computer made in the United States. But John William Mauchy born on August 30, 1907 and died on January 8, 1980. So, this option is not correct.

Sir John Ambrose Fleming (Incorrect)

Sir John Ambrose Fleming was an English electrical engineer and physicist who invented the first thermionic valve or vacuum tube, designed the radio transmitter with which the first transatlantic radio transmission was made, and also established the right-hand rule used in physics.

Herman Hollerith (correct)      

Herman Hollerith was an American businessman, inventor, and statistician who developed an electromechanical tabulating machine for punched cards to assist in summarizing information and, later, in accounting. This machine is patented in 1884.

7 0
3 years ago
What is the supernatural condition called whereby a human transforms into a wolf?
Paraphin [41]
The supernatural condition whereby a human transforms into a wolf is called a werewolf.
4 0
2 years ago
Read 2 more answers
Other questions:
  • What does CPC stand for?
    6·2 answers
  • In order for an IT security framework to meet information assurance needs, the framework needs to include policies for several a
    13·1 answer
  • You are a network technician for a small corporate network. It's been decided that the office needs a wireless network for emplo
    6·1 answer
  • Create a program that includes a function called toUpperCamelCase that takes a string (consisting of lowercase words and spaces)
    9·1 answer
  • Write a program that takes in a line of text as input, and outputs that line of text in reverse. The program repeats, ending whe
    5·2 answers
  • Options to open,save,and print a document are found on which of the following tabs? A.File B.Home C. Design D. Layout
    5·2 answers
  • 4. Explain the term prejudice. What is an example of prejudice as it relates to parenting?
    11·1 answer
  • In Scheme, the form (symbol-length? 'James) will return: Group of answer choices 0 5 6 error message
    11·1 answer
  • Write a program to find the product of 3 numbers
    8·2 answers
  • The objective of this task is to use Scapy to estimate the distance, in terms of number of routers, between your VM and a select
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!