1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
enot [183]
3 years ago
7

The conventional wisdom concerning the security frameworks of domains is that it is always preferable for an organization to cre

ate a framework based on its own needs. Frameworks like ISO and COBIT are resources and should not be used as models to build on
Computers and Technology
1 answer:
Valentin [98]3 years ago
6 0

Answer:

False

Explanation:

A Domain Based Security. "Domain Based Security", abbreviated to "DBSy", is a model-based approach that is being used in analyzing information security risks in a business context and offers an apparent, understandable and direct mapping among the risks and the security controls needed to handle them.

While A security domain is the list of items a subject is permitted to access. More largely defined, domains are collections of subjects and objects with related security requirements.

You might be interested in
Which of the following is equivalent to (p&gt;=q)? <br> i) P q iv) !p Where are genius people?:)
Elena L [17]

Answer:

Explanation:

This is unsolvable if you have no variable substitutes

4 0
2 years ago
you'll be organizing the various databases in your organization, and have recommended hiring a/an?A. internet specialist B. comp
jek_recluse [69]
Either c or d, most probably D
7 0
3 years ago
Read 2 more answers
After selecting multiple calendars, how do you view them in one single calendar? Open the Backstage view and then the Calendar o
blsea [12.9K]

Answer:

its D. in the calendar view, click the view tab, and click they overlay button.

Explanation:

i just got it right on edge 2020

6 0
3 years ago
Read 2 more answers
The parts of a memo are _____.
Alex
The correct answer would be D
4 0
3 years ago
Read 2 more answers
All of these are required categories on a safety data sheet except
ale4655 [162]

I think it is D because you would need there contact information in case something happens not there trade name

3 0
3 years ago
Read 2 more answers
Other questions:
  • What types of automation device might require specialist installer training?
    5·1 answer
  • Janet is testing the effectiveness of four different plant foods. She plants four identical seeds in four identical pots, supply
    6·2 answers
  • A project manager is working with a software development group to collect and evaluate user stories related to the organization’
    7·1 answer
  • Assume that success is a variable of type boolean that has been declared. Assume that processor refers to an object that provide
    6·1 answer
  • You are configuring a switch that has three hosts attached to FastEthernet 0/2 through 0/4. All three hosts are part of a public
    11·1 answer
  • Which of the following statements invokes the GetDiscount function, passing it the contents of two Decimal variables named decSa
    8·1 answer
  • How does modularity provide flexibility in a structured programming design?
    6·1 answer
  • One advantage of a resource like the World Wide Web is that it connects people with problems to people who have__
    14·1 answer
  • Laura is filming a scene in which the subject is sitting with a lit fireplace behind him. The only other source of light in the
    15·1 answer
  • write an algorithm to determine a student's final grade and indicate whether it is passing or failing. the final grade is calcul
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!