1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vera_Pavlovna [14]
3 years ago
5

The cybersecurity defense strategy and controls that should be used depend on __________. Select one: a. The source of the threa

t b. Industry regulations regarding protection of sensitive data c. What needs to be protected and the cost-benefit analysis d. The available IT budget
Computers and Technology
1 answer:
muminat3 years ago
7 0

Answer:

The answer is "Option C"

Explanation:

It is an information warfare-security method, that consists of a set of defense mechanisms for securing sensitive data. It aimed at improving state infrastructure security and stability and provides high-level, top-down, which lays out several new goals and objectives to be met within a certain timeline, and incorrect options can be described as follows:

  • In option a, These securities can't include threats.
  • Option b, and Option d both are incorrect because It is used in industry but, its part of networking.    
You might be interested in
Globalization is based on <br>​
Blababa [14]

Answer:

the growing interdependence of the world's economies.

Explanation:

it's of all the cultures and populations that crossed the border by trading

5 0
3 years ago
Which statements describe the use of styles in Word? Check all that apply.
algol [13]

Answer:

can be used to make word docments look the same

Explanation:

4 0
3 years ago
Read 2 more answers
PLEASE HELP!!!!!! ASAP
NNADVOKAT [17]

Answer:

use a wizard or use a design view

Explanation:

i took the test

4 0
3 years ago
Read 2 more answers
How might your use of computers and knowledge of technology systems affect your personal and professional success?
Xelga [282]
Amost all professions include theuse of computers. Knowing a lot about them and the way they work could help you use them when needed in a work environment. It would also make an employer more likely to hire you.
6 0
3 years ago
Read 2 more answers
Hey guys do you mind subscribing to my utube BrokenShoe once I hit 40 subs I'm doing a massive giveaway of gift cards ps: also g
luda_lava [24]

Answer:

ok

Explanation:

4 0
3 years ago
Other questions:
  • A custom date format set for a date/time field that contains the symbols mmm/dd/yy would display the date as ____.
    12·1 answer
  • In addition to not parking where signs prohibit it, you should never park __________________.
    12·1 answer
  • Given the variables isfulltimestudent and age, write an expression that evaluates to true if age is less than 19 or isfulltimest
    12·1 answer
  • To resize columns in a subform, press and hold or right-click the subform in the navigation pane, and tap or click ____ on the s
    12·1 answer
  • Two or more computers that are linked together are called which of the following
    7·1 answer
  • Advantages of e commerce
    14·1 answer
  • Write a function called printBackwards() that will work with a C string. The function will print any C string backwards. You don
    13·1 answer
  • __________ contain(s) remnants of word processing documents, e-mails, Internet browsing activity, database entries, and almost a
    9·1 answer
  • Mobile computing is growing in importance each and every day, and the IT manager must take that into account. Do some web resear
    14·1 answer
  • <img src="https://tex.z-dn.net/?f=%20%5Cfrac%7Bx%7D%7B1%20%2B%20x%7D%20%20%2B%20%20%5Cfrac%7Bx%20%2B%201%7D%7Bx%7D%20%20%3D%20%2
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!