1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dimaraw [331]
4 years ago
15

An organization is implementing a preselected baseline of security controls, but finds not all of the controls apply. What shoul

d they do?A. Implement all of the controls anyway.B. Identify another baseline.C. Re-create a baseline.D. Tailor the baseline to their needs.
Computers and Technology
1 answer:
WINSTONCH [101]4 years ago
8 0

The answer is Tailoring the baseline to their needs.

After an organization selects applicable security control baseline but finds not all of the controls apply, it initiates a tailoring process to modify the controls appropriately and more closely with specific conditions related to organizational missions, information systems or environments of operation. It is an integral part of the security control selection and specification and involves risk management processes like assessing, responding to, and framing.

You might be interested in
Why was unicode invented
GrogVix [38]
The old system, ASII, was no where near large enough to deal with all the different languages & symbols that exist  
5 0
4 years ago
Read 2 more answers
1) How can you set data types such as Number, currency and date in Ms- Excel? 2) Explain how values, text, data and time can be
cestrela7 [59]

Today I am going to share with you my ideas about my favourite time of the day. All time is great. It is God's gift to us to make or mar ourselves. I respect time whether in the morning, afternoon, evening, or night; I just love time.

8 0
3 years ago
Answer 1 question and get 10 points in return
AlekseyPX

Answer:

3

Explanation:

sorry if I'm wrong...it's been a while since I took a coding class.

5 0
3 years ago
Read 2 more answers
If an external server needs to communicate with servers inside the green zone, which network setting on smoothwall can be opened
astraxan [27]

The network setting on the smooth wall that can be opened when the external server has the need to communicate with the servers inside the green zone is the DMS±pinholes as the pinhole will be opened with the use of the DMZ and to the green zone.

3 0
4 years ago
Read 2 more answers
Draw a flowchart or write pseudocode to represent a program's logic that allows the user to enter a value. The program multiplie
PIT_PIT [208]

Ill choose flowchart. Look picture for the answer

ask me if you have any doubts about my answer.

5 0
3 years ago
Other questions:
  • Write a program that reads in 10 numbers from the user and stores them in a 1D array of size 10. Then, write BubbleSort to sort
    13·1 answer
  • The formatting option functions like space bar. However instead of moving one space at a time, it allows you to move your text i
    7·1 answer
  • In many cases, a subquery can be restated as a/an ______________.
    13·1 answer
  • How would you determine if your earned credits would transfer to a regionally accredited school?
    14·2 answers
  • 1⁰=?<br> Is equal to...........
    12·2 answers
  • Consider the following code: String word [] = {"algorithm", "boolean", "char", "double"}; for ( int i =0; i &lt; word.length/2;
    11·2 answers
  • E) Point out the errors( if any) and correct them:-
    14·1 answer
  • Level Access Test - Please Ignore
    14·1 answer
  • What is the purpose of criteria and constraints? How do they shape design?
    10·1 answer
  • What number is represented as a binary code of 101110
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!