1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
enot [183]
3 years ago
7

The conventional wisdom concerning the security frameworks of domains is that it is always preferable for an organization to cre

ate a framework based on its own needs. Frameworks like ISO and COBIT are resources and should not be used as models to build on
Computers and Technology
1 answer:
Valentin [98]3 years ago
6 0

Answer:

False

Explanation:

A Domain Based Security. "Domain Based Security", abbreviated to "DBSy", is a model-based approach that is being used in analyzing information security risks in a business context and offers an apparent, understandable and direct mapping among the risks and the security controls needed to handle them.

While A security domain is the list of items a subject is permitted to access. More largely defined, domains are collections of subjects and objects with related security requirements.

You might be interested in
Which tool is used to test electrical current within a source of power, like a power supply?
yawa3891 [41]

Answer:

Multimeter

Explanation:

A multimeter or multitester or VOM (volt-ohm-milliammeter), is a tool to measure electricity and this tool has some function to measure voltage, current, and resistance. We could find analog and digital multimeters, and we can find expensive certificates and professionals multimeters ($5,000) or cheap ($10).

5 0
3 years ago
Match the parts of the website address with its correct explanation. http://www.usa.gov/Agencies/federal.shtml
storchak [24]

HTTP means Hyper Text Transfer Protocol underlying protocol used by the World Wide Web(www).

usa is the server name which is used address in the DNS record

.gov is the Domain names which  are used to identify more then one IP addresses

Agencies/federal.shtml a directory is a collection of file resources also called the resource ID.

6 0
3 years ago
Read 2 more answers
The user cannot use a computer system without.................... software<br><br>​
zheka24 [161]

Answer:

the user cannot use a computer system without hardware and software

4 0
3 years ago
Read 2 more answers
I don't know what to do for these two questions
Rainbow [258]
我沒有看到問題?如果您可以在此問題上發布問題,那將非常有幫助!
6 0
2 years ago
When using a calculator be sure to press ____ first.​
matrenka [14]

Answer:

A. C to clear any previous calculations.

hope it helps...

6 0
3 years ago
Read 2 more answers
Other questions:
  • Most graphics software uses a process called pixel _________ to create new pixels by averaging the colors of nearby pixels.â
    6·1 answer
  • Which of these sites would need additional investigation to check for reliability?
    8·2 answers
  • The _________ indicates the number of elements, or values, an array can hold
    14·1 answer
  • I have lost the watch (that,which) you gave me​
    12·1 answer
  • Which of the following countries have mixed-market economy
    5·1 answer
  • What is the output?
    13·1 answer
  • Software that requires excessive disk space or memory.
    15·1 answer
  • SHA-1 produces a(n) ___________-bit message digest, which can then be used as an input to a digital signature algorithm.
    5·1 answer
  • What is the name of the directory that contains symbolic links to unix sysv rc scripts for runlevel 2?
    5·1 answer
  • Edit the following statement so it uses the constant named YEAR:
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!