1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Phantasy [73]
4 years ago
15

Which of the following describes various supporting sturctures for implementing security that provides a resource of how to crea

te a secure IT environment? (choose all that appy)
a. regulatory frameworks
b. reference architectures
c. industry-standard frameworks
d. reference frameworks
Computers and Technology
1 answer:
REY [17]4 years ago
5 0

Answer:

The correct option is c and d i.e. industry-standard framework and reference framework.

Explanation:

The correct option is c and d i.e. industry-standard framework and reference framework.

industry-standard framework - it is referred to as the standard of performing an operation within industry. it provides the basic guideline to set up and perform the task.

Reference framework is referred to as expert comment and guidelines need to follow by the user involved in the enterprise or in a system.  it is a set of pre-defined concepts built by an expert to enhance productivity.

You might be interested in
List and briefly defined categories of security services.
Fynjy0 [20]
There are six categories of security services: authenticiation, access control, data confidentiality, data integrity, nonrepudiation, and availability service. First, is authentication service, which defines as the assurance that the communicator is legitimate and is the one that it claims to be. It can either be peer entity or data origin authentication. Second, access control which is to prevent any unauthorized uses of resources. After one is being authenticiated, then this service limit/controls who access? what accessing rights to the resources are allowed depending on the identified individuals. Data confifentiality: the protection of data from unauthorized disclosure. Data integrity: the assurance that data received are exactly as sent by an authorized entity (e.t.c, contain no modificafion, insertion, deletion, or replay).
7 0
4 years ago
You don't have to answer them all, just give me 2 or 3. Thanks
frozen [14]

Answer:

5. iOS and Android are some popular OS’.

Explanation:

4 0
3 years ago
Match the careers with the education required for each job
Gekata [30.6K]
Statistician for the last one network administaror for the next one then animator then broadcast tech
6 0
3 years ago
Why does my Chromebook keep on turning my new tabs into clever tabs?
Alina [70]

Answer:

Ok, so it's not letting me submit a text response, so I'll attach an image of my answer.

Explanation:

6 0
2 years ago
Read 2 more answers
Which of the following does not describe local alignment algorithm?
swat32

Answer:

The answer is "Option a".

Explanation:

A score can be detrimental. When an element has a score below zero, it means, that the sequences up to this point have no correlations, that are set to zero and its effects the previous alignment is excluded. Thus, alignment can be further found in every position later in the calculation. and other options are incorrect that can be described as follows:

  • In option b, In this option the score can be negative, that's why we can't set its value.
  • In option c, The first row and column must contain some value it can't be 0, that's why it is not correct.
  • In option d, It will start with a lower score and ends with a higher score, that's why it is not correct.

8 0
3 years ago
Other questions:
  • Why do networks need standards?
    12·1 answer
  • What is one reason the SOC categorizes occupations as it does?
    9·1 answer
  • Which equation is correct regarding the measure of ∠MNP? m∠MNP = One-half(x – y) m∠MNP = One-half(x + y) m∠MNP = One-half(z + y)
    15·2 answers
  • How do I turn of the noise canceling feature on my beats studio wireless?
    13·1 answer
  • What is the minimum number of data points you should usually have to look for signs of improvement on a run chart?
    8·1 answer
  • Your customer asks you if it would be worth the investment for him to have Ethernet cabling installed to reach each of his works
    6·1 answer
  • A manufacturing company inspects all products before selling them. Less than 1% are defective and do not pass inspection. You ar
    9·1 answer
  • An attacker is intent on disturbing the communication by inserting bogus packets into the communications.
    9·1 answer
  • You just upgraded five computers with new, larger, hard drives. Now you would like to securely repurpose the old hard drives so
    13·1 answer
  • Fundamental of Computer Science
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!