1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lions [1.4K]
4 years ago
13

A Chief Information Security Officer (CISO) needs to establish a KRI for a particular system. The system holds archives of contr

acts that are no longer in use. The contracts contain intellectual property and have a data classification of non-public. Which of the following be the BEST risk indicator for this system?
(A) Average minutes of downtime per quarter
(B) Percent of patches applied in the past 30 days
(C) Count of login failures per week
(D) Number of accounts accessing the system per day
Computers and Technology
1 answer:
OLga [1]4 years ago
6 0
B. Percent of patches applied in the past 30 days
You might be interested in
Assume a branch instruction bne $t1, $t2, Label is located in 0x00001840 in the instruction memory. The 16-bits branch address i
Ilia_Sergeevich [38]

Answer:

a. 0x00001844

Explanation:

When the branch is takes the new program counter value is increased by 1. The value of existing memory is labelled with number sets and then next instruction is accepted in sequence. The new value is the increase in the current labelled value.

8 0
3 years ago
He ____ content of a web page contains information used by search engines to help users find your website.
luda_lava [24]
The header content of a web-page can contain meta tags that classify the page. Search engines use this information.
6 0
4 years ago
Which generation is characterized by conspicuous consumption?
yulyashka [42]

Answer:

The is the type of consumption is typically associated with the wealthy but can also apply to any economic class.

Explanation:

7 0
3 years ago
A university wants to schedule the classrooms for final exams. The attributes are given below:
iVinArrow [24]

Answer:

See explaination

Explanation:

Clearly the entities are as follows:-

Course

Section

Room

Test

The relationship among entities are as follows:-

Course has Section

Test is conducted for Course

Test is conducted in Section

Test is conducted in Room

Attributes of each entities are as follows:-

Course (CourseID, Name, Department)

Section (SectionID, Enrollment)

Room (RoomNumber, Capacity, Building)

Test (Time)

Section is a week entity as, there may be same sections for different courses, therefore section uses the primary key of course entity as foreign key.

Also entity Test is dependent upon the entities Room,Section and Course, therefore primary keys of these entities will be used as foreign key in the Test entity.

Check attachment for the ER diagram

5 0
3 years ago
Which of these has led to the evolution of mobile marketing?
Nana76 [90]
D. using cell phones in a work place. when cell phones came out with apps and games people started paying more attention to the social media apps and their games then their own job, hope this helps :)
5 0
3 years ago
Other questions:
  • Wharton professor Jerry Wind "believe[s] that digital networks are the key differentiator, [and] enable new forms of sharing, di
    9·1 answer
  • HIPAA protects which of the following kinds of data?
    11·2 answers
  • _______is the equal distribution of visual weight on either side of an imaginary axis through the center of a design. A building
    6·2 answers
  •   Why does a shaded-pole motor run at a constant speed?  A. The lines of force do not change direction.  B. The current through
    15·1 answer
  • People who score high on the Big Five trait dimension of ________ tend to use more adjectives in their e-mail communications. Gr
    15·1 answer
  • Sharon is responsible for the security on web applications. She’s looking to see if all applications have input validation. What
    12·1 answer
  • Which of the following is the key benefit is offered by the Internet channel? Group of answer choices Deeper assortments Immedia
    7·1 answer
  • A network resource is masquerading as a network server and is causing hosts on the network to send requests to the attacker rath
    11·1 answer
  • What messages do we get about ourselves from rap and hip hop
    7·1 answer
  • What are the advantages of Radio waves over micro waves?​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!