1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nikitich [7]
3 years ago
6

Incident damage ____ is the rapid determination of the scope of the breach of the confidentiality, integrity, and availability o

f information and information assets during or just following an incident.
Computers and Technology
1 answer:
Dominik [7]3 years ago
8 0

Answer:

The answer is "assessment"

Explanation:

In the given question some information is missing, that is options that can be described as follows:

a) containment strategy.

b) assessment.

c) incident response.

d) disaster assessment.

Assessment also known as community risk, which is used for evaluations. It played a crucial role in the reaction and recovery after a dangerous incident in any organization.

  • In this process, the Information of the degree and the position, which is lost are included in the collected information by the Accident investigation Taskforce.
  • This data is analyzed to evaluate the needs of members and the entire community, and other choices are wrong that can be described as follows:
  • In option a, It is a part of world war II, that's why it is wrong.
  • In option c, It is a method that is sort major incident, that's why it is wrong.
  • In option d, It uses cost control and risk avoidance, that's why it is wrong.

You might be interested in
The 3rd generation programming language that most students learned when most computers used MS DOS was ___ . It remains a safe p
Diano4ka-milaya [45]

Answer:

Basic

Explanation:

The 3rd generation programming language that most students learned when most computers used MS DOS was basic. It remains a safe programming language for using 3rd party code and provides a coding standard that integrates easily with other programming languages.

7 0
3 years ago
I have no idea, this has two parts. Any help I would love.
lana [24]

Answer:

2that is the question??? then many I could help

7 0
2 years ago
Which is an action that an operating system performs? (1 point)
Darya [45]

The  action that an operating system performs is that it facilitates a computer's basic functions between hardware and software.

<h3>What is the purpose of an operating system in a computer?</h3>

An operating system (OS) is known to be a term that is used in computing and it is said to be one which the program, after being started  is said to be loaded into the computer using the boot program.

It is one that helps to handle all of the other application programs in a computer.

The application programs is known to also make use of the operating system and as such, The  action that an operating system performs is that it facilitates a computer's basic functions between hardware and software.

Learn more about operating system from

brainly.com/question/22811693

#SPJ1

8 0
1 year ago
What was the original name of the Dream SMP?
Naddik [55]

Answer:

Dream Team SMP

Explanation:

7 0
1 year ago
Read 2 more answers
Select the correct answer. Richard wants to use a technology that allows the automation of manufacturing cars in his factory. Wh
Gemiola [76]

CAM C. rapid prototyping is the correct option for Richard wants to use a technology that allows the automation of manufacturing cars in his factory.

<h3>What is prototyping?</h3>

Prototyping is an iterative process in which design teams translate abstract ideas into tangible forms, which might range from paper to digital.

To capture design concepts and test them on people, teams create prototypes of varied degrees of quality. one can modify and validate designs with prototypes.

Thus, option B is correct.

For more details about prototyping, click here

brainly.com/question/24231598

#SPJ1

6 0
2 years ago
Read 2 more answers
Other questions:
  • Ted is a fashion designer. Where is he most likely to work
    9·1 answer
  • _ is a model of computing in which computer processing, storage, software, and other services are provided as a shared pool of v
    10·1 answer
  • To play game, go inside the Grand Theft Auto V folder and right click and runGTAVLauncher as administrator.If you get any missin
    5·1 answer
  • If it can be applied, the least-damaging recovery option is ________.
    10·1 answer
  • The process of adding a header to the data inherited from the layer above is called what option below
    8·1 answer
  • A type of VPN connection, where a single computer logs into a remote network and becomes, for all intents and purposes, a member
    13·1 answer
  • Identify a true statement about heuristics: a. They are more complicated than algorithms. b. Unlike algorithms, they do not perm
    15·1 answer
  • 9. Select the correct answer.
    6·1 answer
  • 4. Ernesto works in a small office with five other people. What are two possible connection
    8·1 answer
  • Post back maintains view state by assigning the form values to a hidden form field named ____.
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!