1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nikitich [7]
3 years ago
6

Incident damage ____ is the rapid determination of the scope of the breach of the confidentiality, integrity, and availability o

f information and information assets during or just following an incident.
Computers and Technology
1 answer:
Dominik [7]3 years ago
8 0

Answer:

The answer is "assessment"

Explanation:

In the given question some information is missing, that is options that can be described as follows:

a) containment strategy.

b) assessment.

c) incident response.

d) disaster assessment.

Assessment also known as community risk, which is used for evaluations. It played a crucial role in the reaction and recovery after a dangerous incident in any organization.

  • In this process, the Information of the degree and the position, which is lost are included in the collected information by the Accident investigation Taskforce.
  • This data is analyzed to evaluate the needs of members and the entire community, and other choices are wrong that can be described as follows:
  • In option a, It is a part of world war II, that's why it is wrong.
  • In option c, It is a method that is sort major incident, that's why it is wrong.
  • In option d, It uses cost control and risk avoidance, that's why it is wrong.

You might be interested in
Find the area of the regular hexagon below by using the area formula for triangles.
mojhsa [17]
I think the answer is B. Because if you multiply 6x8 it’s 48 divided by 2 equals 24
5 0
3 years ago
You have deployed your Ethernet cable near a generator, whose heat is effecting the cable in a way that its energy is lost. If s
Naddik [55]

Answer:

0.7

Explanation:

Atenuation is the loss of power of a signal.

Attenuation = output power/input power

                   = 1.4/2

                  = 0.7

8 0
3 years ago
Describe Mr. Digby, the principal. ​
Gennadij [26K]

Answer:

stinky

Explanation:

7 0
4 years ago
Is the internet a private place?
Ludmilka [50]
Hey there!

No, the internet is not a private place

I hope this helped! :-)
8 0
3 years ago
Read 2 more answers
____________ is demonstrated by the processes and procedures that an organization uses to meet the law.A. An auditB. SecurityC.
Feliz [49]

Answer:

D

Explanation:

because it is a administrative procedure

3 0
3 years ago
Read 2 more answers
Other questions:
  • Which data type uses more memory an integer or an unsigned integer?
    6·1 answer
  • Double clicking a word selects the entire word?
    9·2 answers
  • Why does temperature decrease with higher altitude?
    14·1 answer
  • Why is it important to develop a research plan?
    5·1 answer
  • Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer syste
    7·1 answer
  • Can I use some Company's name in my Research Project. For example, my research is based on E-commerce security and i wanna use A
    14·1 answer
  • Which item is most important for a successful website design?
    6·2 answers
  • What is polymerization1​
    11·1 answer
  • Ssssssssssssssssssssssssssssssssssssssssssssssssss 100 points for this answer too.
    10·1 answer
  • How many types of operating systems do we have as from 2010 till date​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!