1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vera_Pavlovna [14]
4 years ago
5

The cybersecurity defense strategy and controls that should be used depend on __________. Select one: a. The source of the threa

t b. Industry regulations regarding protection of sensitive data c. What needs to be protected and the cost-benefit analysis d. The available IT budget
Computers and Technology
1 answer:
muminat4 years ago
7 0

Answer:

The answer is "Option C"

Explanation:

It is an information warfare-security method, that consists of a set of defense mechanisms for securing sensitive data. It aimed at improving state infrastructure security and stability and provides high-level, top-down, which lays out several new goals and objectives to be met within a certain timeline, and incorrect options can be described as follows:

  • In option a, These securities can't include threats.
  • Option b, and Option d both are incorrect because It is used in industry but, its part of networking.    
You might be interested in
Programmers should strive to _____. increase coupling increase cohesion both of the above neither a nor b
denpristay [2]
The answer is increase cohesion.  <span>Programmers should strive to increase cohesion.  C</span>ohesion<span> points to the </span><span>degree to which the elements inside a module belong together.  </span><span>In a highly </span>cohesive<span> system, code readability and reusability is </span>increased<span>, while complexity is kept manageable.</span>
7 0
3 years ago
Netflix uses ________ analytics to suggest which movies we should watch as well as to develop new content that it is confident w
marusya05 [52]

Answer:

"Predictive analytics" is the correct answer to the given question.

Explanation:

Predictive analysis is the analysis of the data. It is a type of data analytics that gives the future results by analyzing the historical data Some of the examples of predictive analytics are Machine Learning. Netflix is using the technique of Predictive analytics.

Netflix provides the services of entertainment. In Netflix, we watch the movies also it developed the new content.

6 0
3 years ago
Which cell formatting is most likely to use $?
TiliK225 [7]
Currency is the correct answer
4 0
4 years ago
Read 2 more answers
Where do we draw the line between creativity and deception?
BARSIC [14]

Answer:

when you are manipulating the pictures for art and creativity purposes and not for changing your own or others appearance.

4 0
3 years ago
// This class calculates a waitperson's tip as 15% of the bill public class DebugThree1 { public static void main(String args[])
DENIUS [597]

I added a decimal format to keep all decimals within the hundredths place. I also changed the calcTip method to void and the argument to a double. Void means the method doesn't return anything and changing bill to type double let's us pass numbers with decimals to the calcTip method. I hope this helps!

Download txt
4 0
3 years ago
Other questions:
  • Assume a 8x1 multiplexer’s data inputs have the following present values: i0=0, i1=0, i2=0, i3=0, i4=0, i5=1, i6=0, i7=0. What s
    8·1 answer
  • Explain how to identify a starting position on a line.
    15·2 answers
  • Who has access to the source code of proprietary software
    6·1 answer
  • As an improvement of the ATX form factor over AT, shorter wires made it easier to shield them and made them capable of handling
    6·1 answer
  • One blog may have a greater social influence than another when it has_______?
    12·2 answers
  • to add data to to a chart, you must format data from another microsoft office product, that automatically opens. whats the name
    10·1 answer
  • How do i move a file in python3
    10·1 answer
  • What do you hope will be in/added GTA 6?
    13·1 answer
  • Besides a backup technician, who else would have encrypted backup passwords?
    7·1 answer
  • Apply the Fill - Teal, Accent 4, Soft Bevel text effect (the 5th
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!