1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irinina [24]
3 years ago
11

An information security ________ is a specification of a model to be followed during the design, selection, and initial and ongo

ing implementation of all subsequent security controls, including information security policies, security education, and training.
Computers and Technology
2 answers:
borishaifa [10]3 years ago
5 0

Answer:

Framework

Explanation:

A Framework is a structure usually used to solve complex issues.

An information security Framework is a specification of a model to be followed during the design, selection, and initial and ongoing implementation of all subsequent security controls, including information security policies, security education, and training.

N76 [4]3 years ago
3 0

Answer:

framework

Explanation:

Information Security Framework is set of agreed policies that is made by top officials and information security experts which contain the procedure of how insecurity issues can be lowered by outlining major issues that must be taken care of. It enable security agent(s) to have more cognitive and intelligent about the security situation of an organization.

You might be interested in
OSI is a seven-layered framework used to help define and organize the responsibilities of protocols used for network communicati
sergejj [24]

Answer:

True.

Explanation:

OSI network model is a networking framework that has seven layers that describes the encapsulation and communication of devices in a network. The seven OSI model layers are, application, presentation, session, transport, network, data-link and physical layer.

Each layer in this model describes the protocol datagram unit PDU and identifies several standard and proprietary protocols that can be used in a layer.

A network administrator of engineer can decide to use a protocol based on his choice and the brand of network device used.

8 0
3 years ago
Q. Which protocol would best serve to authorize users to access directory services?
Arlecino [84]

Answer:

Lightweight directory access protocol (LDAP)

Explanation:

Lightweight directory access protocol is a protocol that provides a common open protocol for interfacing and querying a directory service information given by a network operating system. LDAP is an application layer protocol that uses port number 389 via tcp and udp. LDAP queries are transmitted in text and allows for all or some data be queried anonymously.

Lightweight directory access protocol, ordinarily does not require user authentication connection, but this can be configured to ask for user credentials.

6 0
3 years ago
A reputable, world-renowned auction house uses blockchain to verify the authenticity of paintings prior to placing them up for s
REY [17]

Answer:

The ledgers are secure, shared, and incorruptible is the correct answer.

6 0
3 years ago
You have stumbled on an unknown civilization while sailing around the world. The people, who call themselves Zebronians, do math
marshall27 [118]

Answer:

a. 6 bits

b. 1

Explanation:

Ans (a)

40 Characters need to be represent by binary coded Zebronian (BCZ) , So You will need 6 bits.

5 bits wold only give you 32 = 2 x 2 x 2 x 2 x 2 unique characters.

So 6 bits would allow you to represent 64 characters.

Ans(b)

BCD = Binrary Coded Decimal is very common in electronics, particularly it displays numerical data.

BCD Encodes each digit of a decimal number into 4 digit binary form.

Each decimal digit is indiviidually converted to oits binary equivalent

For Example : 146 , the decimal degits are replaced by 0001 , 0100 and 0110 respectively

Addition

1 0 = 10 is binary value of 2 2

+1 1 = 11 is binary value of 3 + 3

---------- -----------

1 0 1 5 Ans

Subtraction

1 1= binary value of 3 3

- 1 0 = binary value of 2 - 2

--------- -----------

0 1 1 Ans

6 0
3 years ago
Follow me on Tik-Tok​
ivanzaharov [21]

Answer:

Sure

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • Is anyone familiar in drawing flow charts for c++ programming
    14·1 answer
  • The analog signals that carry analog or digital data comprise composites built from combinations of simple sine waves.
    12·1 answer
  • Antivirus software installed to scan and monitor malware activities on a server or workstation would be identified as a ________
    8·1 answer
  • Discuss the different types of user-friendly interfaces and the types of users who typically use each.
    12·1 answer
  • At what x position are the ellipses drawn??? thanks ♡​
    6·1 answer
  • What is the work of the cpu as processer
    6·2 answers
  • 6.16 LAB: Find largest number (EO) Write a method, findMax(), that repeatedly reads in integers until a negative integer is read
    9·1 answer
  • Which one is better AMD Ryzen 5 Or Nvidia Gtx 2080 ti
    6·1 answer
  • What will the computer do in response to a line of code reading # name = input("What is your name?")
    7·1 answer
  • ________(fill in the blank)in online education is intrinsically related to equity.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!