1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rama09 [41]
3 years ago
14

George is the risk manager for a U.S. federal government agency. He is conducting a risk assessment for that agency's IT risk. W

hat methodology is best suited for George's use?
A. Risk Management Guide for Information Technology Systems (NIST SP800-30).
B. CCTA Risk Analysis and Management Method (CRAMM).
C. Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE).
D. ISO/IEC 27005, "Information Security Risk Management".
Computers and Technology
1 answer:
velikii [3]3 years ago
7 0

Answer:

The methodology for suited for George's use is A. Risk Management Guide for Information Technology Systems (NIST SP800-30)

Explanation:

The Risk Management Guide for Information Technology Systems (NIST SP 800-30) was set in place to conduct risk analysis on federal organizations and their information systems in the U.S.

The other options do not apply to U.S federal government agencies. Hence, George is best suited to use the Risk Management Guide for Information Technology Systems (NIST SP 800-30)

You might be interested in
What need most led to the creation of the Advanced Research Projects Agency Network? DARPA wanted scientists to be able to colla
Bas_tet [7]

(A) DARPA wanted scientists to be able to collaborate and share research easily.

The initial purpose of ARPA was to enable mainly scientific users at the connected institutions to communicate and share resources, also to be able to link computers at Pentagon-funded research institutions over telephone lines, and it became the technical foundation of the Internet.

6 0
3 years ago
Read 2 more answers
Who owns the internet? <br><br> A.) Nobody<br> B.) W3C<br> C.) NSCA<br> D.) The US Military
crimeas [40]

your answe is A i believe


I hope that this helps

and that you have a wonderful day

3 0
3 years ago
B. Some of Company X's new practices and systems are unethical. Business ethics is a set of codes
Artemon [7]

Answer:

They are changing schedules without proper notice, cutting workers without proper notice and falsely advertising.

Explanation:

8 0
3 years ago
A tool that is used to search for and gather data from a page on the internet is called a ?
pshichka [43]
It is called a sesrc engine
8 0
3 years ago
Read 2 more answers
When computer network are joined together they form a bigger network called the​
Airida [17]

Answer:

A WAN can be one large network or can consist of two or more lans connected together. The Internet is the world's largest wan.

Explanation:

8 0
3 years ago
Other questions:
  • You often insert your company's logo into documents you create. One way to make it easier for you to quickly insert it is to sav
    10·1 answer
  • What are scape codes and the effectes on out put
    6·1 answer
  • How can i become an expert in computer and technology?
    15·2 answers
  • Which is a copyright
    13·2 answers
  • The house belives that works should be compensated for the loss of jobs due to automation? Describe it in against motion of the
    15·1 answer
  • What allows users to connect via the Internet to its private network?
    11·2 answers
  • Consider a swapping system in which memory consists of the following hole sizes in memory order: 10 MB, 4 MB, 20 MB, 18 MB, 7 MB
    9·1 answer
  • Can anybody answer this
    11·1 answer
  • ---------------------- use of the Internet to access programs and data on computers that are not owned and managed by the user o
    9·1 answer
  • Which is a benefit of peer-to-peer networking?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!