1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dimaraw [331]
4 years ago
15

An organization is implementing a preselected baseline of security controls, but finds not all of the controls apply. What shoul

d they do?A. Implement all of the controls anyway.B. Identify another baseline.C. Re-create a baseline.D. Tailor the baseline to their needs.
Computers and Technology
1 answer:
WINSTONCH [101]4 years ago
8 0

The answer is Tailoring the baseline to their needs.

After an organization selects applicable security control baseline but finds not all of the controls apply, it initiates a tailoring process to modify the controls appropriately and more closely with specific conditions related to organizational missions, information systems or environments of operation. It is an integral part of the security control selection and specification and involves risk management processes like assessing, responding to, and framing.

You might be interested in
Which broad area of data mining applications analyzes data, forming rules to distinguish between defined classes?
patriot [66]

Answer:

Classification.

Explanation:

Classification is the wide field of data mining apps that analyzes data and establishes rules for making a distinction in specified classes.

Data mining is a method that corporations use to transform the raw information into valuable information. Corporations can understand something about their clients through using technology to identify trends in large quantities of info to create more successful marketing campaigns, increase revenue and reduce costs.

6 0
3 years ago
A period in which unemployment is low, business produces many goods and services, and wages are good is called ______.
ddd [48]

Answer:

A

Explanation:

4 0
3 years ago
Over a TCP connection, suppose host A sends two segments to host B, host B sends an acknowledgement for each segment, the first
Margaret [11]

Answer:

a. Host A will retransmit neither segments

Explanation:

The options are:

a. Host A will retransmit neither segments

b. Host A will retransmit first segment

c. Host A will retransmit the second segment

d. Host A will retransmit both segments

The first acknowledgment is lost but the second acknowledgment arrives before the timer of the first segment expires, and hence the host A gets confirmation that Host B has received both the segments. And hence Host A will retransmit neither segments.

4 0
3 years ago
Not everything is a success all of the time! So do you know which version of Windows was the least popular?
mario62 [17]

Answer:

windows xp

Explanation:

I think because it is not fast and don't play the games and programs which have higher requirements

7 0
3 years ago
What is the service provided by a third party (such as an ISP) that enables you to connect another cloud directly to your Google
Olenka [21]

Answer:

A. Dedicated interconnect

Explanation:

With dedicated interconnect, there is a direct connection between your network and that of Google. It enables you to connect another cloud directly to your Google cloud resources to create hybrid cloud solutions. In other words, Dedicated Interconnect enables hybrid networking. Businesses can now extend their own private cloud into Google's cloud so they can switch control between the two with little latency. This gives them (businesses) control over the amount of data entering into the two clouds.

8 0
4 years ago
Other questions:
  • The design activity key question, "how will this system interact with other systems..." is part of which design activity?​
    7·1 answer
  • What are the nicknames for the first generation computers
    8·1 answer
  • What statement best describes the Microsoft Windows operating system?
    13·2 answers
  • Web-based e-mail like Hotmail is an example of three-tier client-server architecture that provides access to e-mail messages. Tr
    7·1 answer
  • Quienes son el proyectista y el director de obra en una ICT
    6·1 answer
  • 3) Prompt the user for a 3-digit number, and the output should be the magical #, which is formed with each digit shifted to the
    13·1 answer
  • The temperature in toronto canada was-4°c and tje temperature in brixton,england was 6°c warmer. what was the difference in temp
    11·1 answer
  • Why was CDR the most developed country in nepal. Highlight any six reasons​
    9·1 answer
  • When creating an html document, what do we use to set aside space for content?.
    13·1 answer
  • An array called numbers contains 35 valid integer numbers. Determine and display how many of these values are greater than the a
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!