1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nasty-shy [4]
4 years ago
11

An organization is deploying a new system to the production environment. A security analyst discovers the system is not properly

hardened or patched. Which of the following BEST describes the scenario?
A. A secure baseline was not established early in the process.
B. User acceptance testing was not completed.
C. Integrity checks were not conducted to ensure it was the correct system.
D. An application code error was introduced during the development phase.
Computers and Technology
1 answer:
Alisiya [41]4 years ago
5 0

Answer:

The best answer is A) A secure baseline was not established early in the process.

Explanation:

If the organization is deploying to the production environment and the security analyst discovers this risk at this point, then a secure baseline was not established, because it is impossible to successfully pass the coding and peer review instances by programmers and testing instances by the QA team without any warning to correct this problem.

You might be interested in
Which steps will open the Access Options dialog box? Complete each statement using the drop-down menus
Novosadov [1.4K]
I believe it is Number 3
4 0
3 years ago
Read 2 more answers
________ is the concept describing the difference between people who have easy access to technology and those who do not.
earnstyle [38]

Answer:

The answer is Digital divide.

Explanation:

Digital divide describes the differences between people with access to the internet, computers or modern ICT or Information Communication Technology and the people that do not.

The effect of digital divide is described below:

  1. It affects economic growth. Due to a lack of access to technology in some areas, they experience low economic growth and cannot be compared to areas with easy access to technology.
  2. It affects education. Students with easy internet access and other technological facilities always have information at the tip of their fingers compared with students who only go to the libraries or listen to the radio to get information.
  3. It affects Political participation. Access to technology increases the citizen's participation in politics while it has a negative effect on places with no access to technology.
5 0
3 years ago
Which of the following might be appropriate to be created as a constant variable?
jasenka [17]

Answer:

Number of feet in a mile

Explanation:

In this problem, we need to find an option that to be created as a constant variable.

In option (a) "number of feet in a mile".

As 1 mile = 5280 foot

The number of feet in a mile is constant in every condition.

In option (b), (c) and (d)

number of people inside a store , current grade in a class , score in a football game are no fixed. It is not created as a constant variable.

Hence, the correct option is (a).

7 0
3 years ago
List any three positive impacts of computer technology in our society?
arlik [135]

Answer:

nWhich statement about the origins of the American population is true?

A most Americans descend from people who first populated this continent about 20,000 years ago

b about 98 percent of Americans live in this country due to the waves of Irish and German people who came in mid 1800s

c immigration expander the American population before 1806 ,bur has no significantly contributed to it since then

d the vast majority. of Americans ms either descended from immigrats or are immigrants themselves

Explanation:

sjsikskakakakakkakznxjduwjawjieieiwiwiwiwiwiw idek computer mouse laptopdhsjsjsjsjjsjs

6 0
3 years ago
When a computer is the.................of an attack, it is used as an active tool to conduct the attack
BARSIC [14]

Answer:

Attack is an intentional or unintentional act that causes damage or compromises information of systems supporting it.When a computer is the subject of an attack, it is used as an active tool to conduct the attack.

On the other hand, when a computer is the entity being attacked, it is the object of an attack.

3 0
3 years ago
Other questions:
  • Write a function "nonRepeatings" that takes a string "s3" and returns the non-repeating characters in this string. Sample Input
    11·1 answer
  • Narrowband Satellite Communications supports ______________ data rates for both mobile and fixed users by providing access on a
    8·1 answer
  • Arrange the following units of storage in descending<br> order. B, TB,KB, GB,MB
    5·1 answer
  • You want to change your cell phone plan and call the company to discuss options. This is a typical example of CRM that focuses o
    9·1 answer
  • Select which is true for for loop​
    11·1 answer
  • Solving Systems of Equations by Substitution <br> pdf
    11·1 answer
  • 1. Assuming you are downloading a 100MB (800Mb) file on a Network that can download data at 54Mbps.
    15·1 answer
  • What is the full form of computer​
    13·2 answers
  • What number is represented as a binary code of 101110
    5·2 answers
  • What causes the hidden node problem in a wireless local area network (wlan)?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!