1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valentinak56 [21]
3 years ago
7

Howard is leading a project to commission a new information system that will be used by a federal government agency. He is worki

ng with senior officials to document and accept the risk of operation prior to allowing use.
What step of the risk management framework is Howard completing?

a. Implement security controls in IT systems.
b. Assess security controls for effectiveness.
c. Authorize the IT system for processing.
d. Continuously monitor security controls.
Computers and Technology
1 answer:
Ann [662]3 years ago
5 0

Answer:

The correct answer is A.

Explanation:

Given the example in the question, Howard is at the step of implementing security controls.

There are five official steps for the risk management framework.

  1. Categorizing The Information System: In this step, the IT system's objectives are assigned based on the current mission or project.
  2. Selecting Security Controls: After the risk assesment is done, the security controls for technical, hardware and software problems are decided according to the outcome.
  3. Implementing Security Controls: In this step, the points that were decided in the step before are put into action.
  4. Authorizing The Information System: Authorization for the risk management is approved and monitored.
  5. Monitoring Security Controls: The authorities keep monitoring the process and makes any necessary changes and updates.

The process that is explained in the question is step 3, which is given in option A.

I hope this answer helps.

You might be interested in
Int x = 25;
Olin [163]

Answer:

printer

Explanation:

4 0
3 years ago
A shrug is an example of
Gwar [14]
A shrug is an example of a non verbal expression that could mean the person does not know or has doubt but it depends on the context.
3 0
3 years ago
Explain how the use of the internet has allowed people to achieve some
zubka84 [21]

I don't know if this is going to help you or not because I'm only 13 but let me know if it helps people can now talk to one another more effectively because of things like zoom and it's become more efficient to work at home because we can have online meetings

5 0
3 years ago
How do I fix my mistake in my code????
Kryger [21]

Answer:

bugs

Explanation:

when starting to learn to code, it don´t take long to realise that it´s very hard to write software that works. When software don´t work we say has a bug see how to report bugs in Mu for the world´s very first important thing.

7 0
3 years ago
We consider a string with only alphabets 'a', 'b', 'c'. A string is diverse if no three consecutive letters are the same. Meanin
hram777 [196]

Answer:

from itertools import permutations

import math

import re

a = int(input())

b = int(input())

c = int(input())

num = math.ceil((a + b + c) / 2)

str_val = a*'a'+b*'b'+c*'c'

str_per = list(set(list(permutations(str_val))))

temp_str, output_str = [], []

val = ["".join(i) for i in str_per]

for each in val:

   all_find_str = re.findall(r"([a-z])\1{2,}", each)

   if not all_find_str:

       output_str.append(each)

   else:

       all_find_str = re.findall(r"([a-z])\1{2,}", each[:num])

       if not all_find_str:

           temp_str.append(each[:num])

if output_str:

   print((output_str[0]))

else:

   print("Output is:", set(temp_str))

Explanation:

We first need to have all necessary modules imported.

This is a permutation related question and we will be using the permutation module. The math and regular expression module is also imported.

The program begins by getting the user inputs for <em>a, b, c</em>.

A permutation is ran based on the values of the letters. Permutations work by finding the number of ways the strings can be joined.

If the permutation is more than one, the first index is the default output. If a single string is generated, it will be the output. A blank string will be the output if generating a string is impossible.

8 0
4 years ago
Other questions:
  • How to hack the school system
    12·1 answer
  • Consider the function definition void Demo( int&amp; intVal, float floatVal ) { intVal = intVal * 2; floatVal = float(intVal) +
    7·1 answer
  • Which of the following are recommended techniques for protecting computer files and data? Check all of the boxes that apply.
    15·2 answers
  • I’m which scenario would someone most likely be using presentation software ?
    6·2 answers
  • The programming projects of Chapter 4 discussed a Card class that represents a standard playing card. Create a class called Deck
    7·1 answer
  • Consider the following static method, calculate.
    10·1 answer
  • Compare and contrast between first and second generation of computer<br>​
    6·1 answer
  • Is there an alternative website of https://phantomtutors.com/ to get guidance in online classes?
    15·1 answer
  • What should you commit to your family members?
    10·1 answer
  • Draw a flowchart for an algorithm which calculates how much money a student will need per week to buy a meal and two drinks each
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!