1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nikitich [7]
3 years ago
6

Incident damage ____ is the rapid determination of the scope of the breach of the confidentiality, integrity, and availability o

f information and information assets during or just following an incident.
Computers and Technology
1 answer:
Dominik [7]3 years ago
8 0

Answer:

The answer is "assessment"

Explanation:

In the given question some information is missing, that is options that can be described as follows:

a) containment strategy.

b) assessment.

c) incident response.

d) disaster assessment.

Assessment also known as community risk, which is used for evaluations. It played a crucial role in the reaction and recovery after a dangerous incident in any organization.

  • In this process, the Information of the degree and the position, which is lost are included in the collected information by the Accident investigation Taskforce.
  • This data is analyzed to evaluate the needs of members and the entire community, and other choices are wrong that can be described as follows:
  • In option a, It is a part of world war II, that's why it is wrong.
  • In option c, It is a method that is sort major incident, that's why it is wrong.
  • In option d, It uses cost control and risk avoidance, that's why it is wrong.

You might be interested in
Consider the partially-filled array named a. What does the following loop do? (cin is a Scanner object)int[] a = {1, 3, 7, 0, 0,
boyakko [2]

Answer:

Option 1: May crash at runtime because it can input more elements than the array can hold

Explanation:

Given the code as follows:

  1.        int[] a = {1, 3, 7, 0, 0, 0};
  2.        int size = 3, capacity = 6;
  3.        int value = cin.nextInt();
  4.        while (value > 0)
  5.        {
  6.            a[size] = value;
  7.            size++;
  8.            value = cin.nextInt();
  9.        }

From the code above, we know the <em>a</em> is an array with six elements (Line 1). Since the array has been initialized with six elements, the capacity of the array cannot be altered in later stage.

However, a while loop is created to keep prompting for user input an integer and overwrite the value in the array started from index 3 (Line 4- 9). In every round of loop, the index is incremented by 1 (Line 7). If the user input for variable <em>value</em> is always above zero, the while loop will persist.  This may reach a point where the index value is out of bound and crash the program. Please note the maximum index value for the array is supposedly be 5.  

8 0
3 years ago
Graphical elements that precede each item in a list are known as​ __________.
Vanyuwa [196]

The answer in the space provided is the bullets as this is the graphic elements that are used in each items that is organized in a list in a way of making the list more clearer and more presentable with the given indications or symbols.

4 0
3 years ago
:3 11 points!
Lady_Fox [76]

Answer:

If it's for school idk but I have a brothers printer and it has worked since 2009

Explanation:

7 0
3 years ago
PLEASE HELP ASAP!! WILL MARK BRAINLIEST!! 20 POINTS!!
Sonbull [250]

Answer:

kiss me

Explanation:

you must kiss me

8 0
3 years ago
An intruder tries a large number of possibilities in rapid succession to guess a password. As a result, other users on the netwo
Daniel [21]

A brute force is the type of attack that occurs when other users on a network are locked out because an intruder is trying to gain access by guessing a large number of password.

<h3>What is a brute force?</h3>

A brute force attack refers to a situation where someone uses a trial-and-error to guess login info, encryption keys etc.

In conclusion, the brute force is the type of attack that occurs when other users on a network are locked out.

Read more about brute force

brainly.com/question/2323336

8 0
3 years ago
Other questions:
  • Assume the following variable definitions int a = 5, b = 12; double x = 3.4, z = 9.1. What are the values of the following expre
    7·1 answer
  • In Microsoft Word, spelling errors are identified by a _____.
    5·2 answers
  • The best place to start when you are looking for information about a device or an application is the ____ of the company that ma
    14·1 answer
  • Minerals that contain the elements silicon and oxygen are called ______.
    7·1 answer
  • Yuri is a skilled computer security expert who attempts to break into the systems belonging to his clients. He has permission fr
    5·1 answer
  • Write the line that declares a two-dimensional array of strings named chessboard. that is, how would i declare a two-dimension a
    7·1 answer
  • Powerful IT security systems are needed to defend against what appears to be authorized access to a network or application. Sele
    6·1 answer
  • When designers follow accepted standards and protocols, which of the four basic characteristics of network architecture is achie
    6·1 answer
  • a value-returning method must specify as its return type in the method header. question 18 options: a) an int b) a double c) a b
    9·1 answer
  • as a pc technician, you are on the road most of the day and use a laptop. when you get back to your office at the end of the day
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!