1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetradugi [14.3K]
3 years ago
14

Of the sequences listed below, which shows the correct order of the steps in the incident management workflow: (1) authenticate

the incident, (2) archive the incident, (3) log the incident, and (4) prioritize the problema. 4 – 3 – 1 – 2b. 3 – 1 – 2 – 4c. 1 – 3 – 4 – 2d. 1 – 2 – 3 – 4
Computers and Technology
1 answer:
slega [8]3 years ago
3 0

Answer:

C.

Explanation:

In the Incident Management Workflow , first you Authenticate the incident; Then log the incident. Then prioritize the problem; and then archive the incident.

Thus, 1 - 3 - 4 - 2

Cheers

You might be interested in
Why would a network administrator want to filter certain ports when capturing data such as FTP traffic
hjlf

Answer:

To avoid receiving malware-infected files like spam.

Explanation:

Hackers use malware to gain unauthorized access to company files and information for personal gain. Files infected by the malware can infect other systems or files. There are various types of malware namely; virus, trojan horse, worm, spyware, ransomware, adware etc.

5 0
3 years ago
Which type of database program is Microsoft Access 2016?
nadya68 [22]

Answer:

O relational

Explanation:

If I'm wrong I'm so so sorry! But form my research it keeps saying its relational.

If I'm right please give me brainliest I really need it to level up so please help me!

If you don't know how to give brainliest there should be a crown underneath my answer you just have to click it.

Thank you and have a wonderful night,morning,afternoon/day! :D

6 0
3 years ago
Read 2 more answers
Does anyone know a NC wise owl password I can use, it's an emergency!! I can't ask my school because they are closed and I need
snow_tiger [21]
The password would be Apple 123
6 0
3 years ago
Which task does Word NOT give you the ability to accomplish?
ale4655 [162]

Is this multiple choice?

4 0
3 years ago
How does tracking changes relate to sharing a workbook in Excel?
ElenaW [278]

Answer:When you highlight changes as you work, Excel outlines any revisions (such as changes, insertions, and deletions) with a highlighting color. On the Review tab, click Track Changes, and then click Highlight Changes. Select the Track changes while editing. This also shares your workbook check box.

Explanation:

8 0
2 years ago
Other questions:
  • The ________ is(are) used to display information on the computer's screen.
    13·1 answer
  • What is the name used for the integrated program development environment that comes with a Python installation?
    5·1 answer
  • You need to delegate AD RMS responsibilities to a junior administrator. You don't want to give the administrator more permission
    14·1 answer
  • True or false? any webb app can be accessed and run on any computing
    12·1 answer
  • An email address contains the @ character. Write a program that takes asks for an email address input from the user and determin
    5·1 answer
  • 10 POINTS
    5·1 answer
  • Making the data impossible to recover even by applying physical forensics methods is known as __________ of media.
    13·1 answer
  • Create a view named Top10PaidInvoices that returns three columns for each vendor: VendorName, LastInvoice (the most recent invoi
    12·1 answer
  • Web analytical packages can obtain the following information when someone visits a website, except Group of answer choices name
    9·1 answer
  • What would a system unit that is integrated with the display and keyboard would be considered?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!