1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katen-ka-za [31]
3 years ago
10

In implementing Security Life Cycle:__________

Computers and Technology
1 answer:
Dvinal [7]3 years ago
7 0

Answer:

b) one needs to follow through all phases, assessment, design, deploy and manage security

Explanation:

The security life cycle is a process in which it involves the security artifacts for developing the software through a lifecycle. It contains a detailed plan that derives how to create an application form

At the time when the requirements and activity related to design is finished the next step is the software implementation. In this, the developers begins with the coding as per the requirements and designs discussed in the last step

Therefore according to the given options, the second option is correct

You might be interested in
Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption
Darya [45]

Answer:

Hardware security module.

Explanation:

Hardware security module is a Physical digital device that comes as a plug-in adapter used to secure and manage digital keys and provides crypto processing for strong authentication.

It has an onboard cryptographic keyboard and one or more crypto processors, and can be used on computers and network servers to prevent logical or physical authentication access to unauthorized users. It supports symmetric and asymmetric cryptography.

8 0
3 years ago
Least common multiple of 78,90, and 140
Daniel [21]
The least common multiple (LCM) of 78, 90, and 140 is: 16,380

78 × 210 = 16,380
90 × 182 = 16,380
140 × 117 = 16,380
5 0
4 years ago
Read 2 more answers
Which of the following is an example of a complex formula?
myrzilka [38]

Answer:

=A1<=A14

Explanation:

complex formula in excel is which contain more than 1 mathematical operators . An order of mathematical operations are important to understand

there are different type of operators

  • Arithmetic operators
  • Comparison operators
  • Text operators
  • Operators reference

here Comparison operator is an example of complex formula . Comparison operator returns TRUE/FALSE it is use to compare two values

= Equal to

< Less than

> Greater than

>= Greater than or Equal to

<= Less than or Equal to

7 0
3 years ago
A more efficient design which involves the logical separation of a switch ports into different broadcast domains is known as a _
Nataly [62]

Answer: Virtual local-area network (VLAN)

Explanation:Virtual LAN(local area network) is the network that works on the particular geographical environment/domain in separative way by pretending to be working in the same local area.

This network works to maintain the security and network management in the geographical area .It is implement to gain the scalability and adaptability to the changes occurring in the network.

3 0
3 years ago
If a data label, title, or legend in a chart is difficult to read, you can format them as bold, but you cannot change the font s
Daniel [21]

If a data label, title, or legend in a chart is difficult to read, you can format them as bold, but you cannot change the font size: False.

<h3>What is a chart?</h3>

A chart can be defined as an effective medium that is used to graphically display data in a pictorial form. Thus, a chart comprises the following elements:

  • Data label
  • Title
  • Legend

If the aforementioned elements in a chart is difficult to read for the end users, they can easily format them as bold and equally change the font size.

In conclusion, the elements in a chart can be formatted as bold and their font size can also be changed.

Read more on chart here: brainly.com/question/24741444

8 0
2 years ago
Other questions:
  • A. When executing System.out.println(a1), the toString() method in the Object class is invoked.
    14·1 answer
  • Using a pin or password in addition to tpm is an example of what type of authentication?
    13·1 answer
  • A range in which a measuring instrument or controller does not respond is the
    12·1 answer
  • When using a wireless mouse, what is the most common port used for the transmitter? 
    7·1 answer
  • during zach's second visit of the year, he incurred a $450 bill. Describe how much is paid by Zach and the insurance carrier
    7·1 answer
  • The keyboard and the mouse____ parts of a computer ​
    8·1 answer
  • Read the four detective reports and the combined affidavit and warrant for the M57 Patents case. Write a one- to two-page paper
    5·1 answer
  • SATCOM in the Ku- and Ka- bands, as well as EHF systems are adversely affected by rain (the higher the frequency, the greater th
    14·1 answer
  • What is the maximum current that should be allowed in a 5.0w 220 resistor?
    12·1 answer
  • Suppose a byte-addressable computer using set-associative cache has 2 16 bytes of main memory and a cache size of 32 blocks and
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!