1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Karo-lina-s [1.5K]
3 years ago
11

. The first step in devising security services and mechanisms is to develop a security policy True False

Computers and Technology
1 answer:
Evgen [1.6K]3 years ago
5 0

Answer: True

Explanation: For the creation of the security services and function the first step is having a policy regarding the security measure that is to be taken.Security policy consist of the procedures and function that should be implement in the system as a plan.

It monitors the flow,accessing of external component ,data assessment etc fro the protection.After the policies are made then the implementation take place. The most common deployment of this policy is in information technology(IT)sector .Thus, the given statement is true..

You might be interested in
Which generation is called the new silent generation?
Scorpion4ik [409]
Hello! The people born in the 1920's until the 1940's were called the "Silent Generation" or the "G-I Generation" because many people focused on careers rather than activism.

Cheers!
-10th Grader Snow
7 0
4 years ago
Subjective Questions
Ilya [14]

Answer:

3 I'm hope I'm right sorry if I'm not

8 0
3 years ago
Please tell fast plzzzzzzzz​
NemiM [27]

Answer:

Cyberbullying is the use of digital-communication tools (such as the Internet and cell phones) to make another person feel angry, sad, or scared, usually again and again.

7 0
3 years ago
Read 2 more answers
A group of students want to create an educational online game for computer laboratory in their school which type of network will
Natali [406]

Answer:

A.LAN

Explanation:

LAN (Local area Network) is a type of data communication network which covers a small geographical area such as a school compound. This network can accommodate variety of electronic devices including computers, laptops, file servers, printers and modems. In this example, a room can be identified for the project to consist of more than 20 computers sharing a file server and a single hard drive.

Best wishes!

6 0
3 years ago
The DNS server at your headquarters holds a standard primary zone for the abc domain. A branch office connected by a slow WAN li
mafiozo [28]

Answer:

In the SOA tab of the zone's Properties dialog box, increase the refresh interval.

Explanation:

5 0
3 years ago
Other questions:
  • Write a function named print_backward that accepts a String as its parameter and prints the characters in the opposite order. Fo
    12·1 answer
  • I need help RIGHT NOW PLZ!!!!!!!!!!!!! this is due in 5 mins
    13·1 answer
  • Data arranged and stored in a data set
    9·1 answer
  • Which of the following is an example of batch processing?
    14·1 answer
  • Which type of program would allow Adriana to see what she is creating rather than just a code
    14·2 answers
  • A developer has been asked to create code that will meet the following requirements: Receives input of: Map, List Performs a pot
    13·1 answer
  • In the circuit shown in the figure above, what will happen when switches S1 and S3 are both closed? 
    8·1 answer
  • Why does everyone refer to dogs as being loyal
    11·2 answers
  • Horizontal and vertical flips are often used to create ___.
    12·1 answer
  • Explain the role that the number of data exchanges plays in the analysis of selection sort and bubble sort. What role, if any, d
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!