1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valentinak56 [21]
3 years ago
7

Howard is leading a project to commission a new information system that will be used by a federal government agency. He is worki

ng with senior officials to document and accept the risk of operation prior to allowing use.
What step of the risk management framework is Howard completing?

a. Implement security controls in IT systems.
b. Assess security controls for effectiveness.
c. Authorize the IT system for processing.
d. Continuously monitor security controls.
Computers and Technology
1 answer:
Ann [662]3 years ago
5 0

Answer:

The correct answer is A.

Explanation:

Given the example in the question, Howard is at the step of implementing security controls.

There are five official steps for the risk management framework.

  1. Categorizing The Information System: In this step, the IT system's objectives are assigned based on the current mission or project.
  2. Selecting Security Controls: After the risk assesment is done, the security controls for technical, hardware and software problems are decided according to the outcome.
  3. Implementing Security Controls: In this step, the points that were decided in the step before are put into action.
  4. Authorizing The Information System: Authorization for the risk management is approved and monitored.
  5. Monitoring Security Controls: The authorities keep monitoring the process and makes any necessary changes and updates.

The process that is explained in the question is step 3, which is given in option A.

I hope this answer helps.

You might be interested in
What methods would you add to make this class declarationvery useful?
sergij07 [2.7K]

Category(int age)- This method is used to declaring the age.

incrementingAge(int age)-This method is used for incrementing  the age.

SettingAge(int age) -This method is used to initializing the age.

These are the three methods for making declaration very useful.

Explanation:

Class Cat

{

public:

Category(int age)

{

itsAge =age;

}

int incrementingAge(int age)

{

itsAge = itsAge+ age;

}

int SettingAge(int age)

{

itsAge =age;

}

int GetAge() const;

private:

         int itsAge;

};Answer:

5 0
3 years ago
Read 2 more answers
Write Epic username plz
Nikitich [7]

Answer:

Epic username: AspectLegends

Explanation:

3 0
2 years ago
In every organization, workers receive and sendinformation daily. The flow of this information should be____________.upward and
Aleks [24]

Answer:

upward and downward

Explanation:

4 0
3 years ago
Part 2: Code the Program
OverLord2011 [107]

Answer:

# Name - Today's Date

# Description

def main():

    print("My favorite TV show is Mythbusters.")

    print("I like it because I learn a lot and they do crazy experiments.")

main()

(this is the best I can do since it's a specific result based on the choices you make, but I did the example code and you just need to fill it in with the necessary requirements. I also tested it on IDLE. )

8 0
3 years ago
In Google search results, how are organic links different from sponsored links?
xxMikexx [17]
Sponsored links are links that have been paid for in order to bring them to the first positions when the engine returns the results of the search.  Organic links are links that have not been paid for.  Your answer is D.
4 0
3 years ago
Read 2 more answers
Other questions:
  • Today, air travel allows large numbers of people to move quickly over long distances. Which of the following is a likely effect
    8·1 answer
  • What shooting position is commonly used when hunting with a shotgun?
    14·2 answers
  • IT investments can lead to developing IT capabilities and dynamic IT competencies, which can lead to achieving the following six
    5·1 answer
  • When a Python program is reading a file, the data is input as plain ASCII characters in a string. What is the following code doi
    15·1 answer
  • which telecommunications service allows internet and telephone service to work over the same phone line
    13·1 answer
  • WILL GIVE BRAINLIEST!!
    12·1 answer
  • Text can be easily moved from one location to another using _____.
    15·1 answer
  • Consider a swapping system in which memory consists of the following hole sizes in memory order: 10 MB, 4 MB, 20 MB, 18 MB, 7 MB
    9·1 answer
  • An ALGORITHM IS?<br> PLEASE HELP
    14·1 answer
  • Which of these five are Netflix Originals?1/5
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!