1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KATRIN_1 [288]
4 years ago
14

The ____ job functions and organizational roles focus on protecting the organization's information systems and stored informatio

n from attacks.
A. Organizational management and professionalsB. Information security management and professionalsC. Information technology management and professionalsD. Human resource management and professional
Computers and Technology
1 answer:
dalvyx [7]4 years ago
5 0

Answer:

Option B i.e., Information security management and professionals is the correct option.

Explanation:

They performs the work duties and operational responsibilities focus on supporting the information systems of the corporation and information stored against threats. IMS is a set of principles and protocols for the structured handling of sensitive information within an enterprise. An ISMS helps to eliminate risks and maintain continuity of operation through pro-actively minimizing the effects of a breach of security.

You might be interested in
A security team has downloaded a public database of the largest collection of password dumps on the Internet. This collection co
Scorpion4ik [409]

Answer:

a. Password length, password encryption, password complexity

Explanation:

Under this scenario, the best combination would be Password length, password encryption, password complexity. This is because the main security problem is with the user's passwords. Increasing the password length and password complexity makes it nearly impossible for individuals to simply guess the password and gain access, while also making it extremely difficult and time consuming for hackers to use software to discover the password as well. Password excryption would be an extra layer of security as it encrypts the password before storing it into the database, therefore preventing eavesdroppers from seeing the password and leaked info from being used without decryption.

4 0
3 years ago
Often technical personnel who are not familiar with security techniques think that restricting access to ports on a router or fi
zavuch27 [327]

Answer:

This is not a good solution

Explanation:

Your web browser uses port 80 outgoing to make web requests, so if you’re blocking incoming port 80, all you’re blocking is users of the organization from connecting to the internet. You have indeed close a vulnerable port to access from hackers, but this also can reduce the productivity of the organization.

3 0
3 years ago
The company called ____ offers a complete graphic information system software solution for computer-generated maps that stores a
jeyben [28]
The answer is <span>ESRI.  It </span>offers a complete graphic information system software solution for computer-generated maps that stores all its data in your oracle 10g database.  It stands for Environmental Systems Research Institute.  Esri's<span> GIS mapping software is the most powerful mapping and spatial data analytics technology available.</span>
7 0
3 years ago
Nina is trying to learn more about how computers work. She has repeatedly read that the motherboard is the "brain” of the comput
Lady bird [3.3K]

Its

Processes the data on the computer .

5 0
3 years ago
Read 2 more answers
15
valina [46]

Answer:

B.

shutter priority mode

Explanation:

Shutter Priority, which is mentioned as S on the mode dial, and the mode is  the time value, and is demoted as Tv, that points out to the setting in different forms of cameras that allows all to select a particular shutter speed, and as meanwhile the camera balances the aperture to ensure correct exposure in the image.

7 0
4 years ago
Read 2 more answers
Other questions:
  • Ruby is creating a presentation. She wants each slide displayed at intervals of five seconds. Which feature in the presentation
    6·2 answers
  • Which windows tool can you use to find out if the hard drive is slowing down windows performance?
    9·1 answer
  • You asked your colleague to provide feedback on a blog post you recently wrote. When they sent you their feedback, they made edi
    10·1 answer
  • Technological uncertainty:
    15·1 answer
  • 3. Assume a disk drive from the late 1990s is configured as follows. The total storage is approximately 675MB divided among 15 s
    11·1 answer
  • The Integers 10, 30, 20 are inserted in that order, into an AVL Tree. Which sequence of commands will make the correct method ca
    7·1 answer
  • - Explain the Windows User Authentication process for Client connecting to the domain
    11·1 answer
  • What is Naptha used for?
    9·2 answers
  • A flower is an example of _______________? (Select the best answer.)
    13·2 answers
  • Data is stored on ________ using a laser to either melt the disc material or change the color of embedded dye.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!