1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lions [1.4K]
3 years ago
13

A Chief Information Security Officer (CISO) needs to establish a KRI for a particular system. The system holds archives of contr

acts that are no longer in use. The contracts contain intellectual property and have a data classification of non-public. Which of the following be the BEST risk indicator for this system?
(A) Average minutes of downtime per quarter
(B) Percent of patches applied in the past 30 days
(C) Count of login failures per week
(D) Number of accounts accessing the system per day
Computers and Technology
1 answer:
OLga [1]3 years ago
6 0
B. Percent of patches applied in the past 30 days
You might be interested in
Which speaker port should you use when connecting a single speaker to a pc?
natima [27]
The auxiliary port I think
5 0
3 years ago
Develop a list of privacy protection features that should be present if a website is serious about protecting privacy. Then, vis
dusya [7]

Answer:

The features that required to protect the privacy should be:

  1. Protection of User name and Password
  2. Protection of Finger print and other bio metric information if collected from user.
  3. Protection of Personnel Information such as contact information, Identity information if collected.
  4. Protection of data shared such as pictures and videos.

Explanation:

Privacy protection is required to different websites that are involved in collection of different information from users such as user name, password, contact information, account information and messengers. These websites could be website of some bank, online mailing platforms, online shopping platform and social media platforms. These all are used to share and gather our personnel information for different purposes. To ensure the protection of user data they signed a document with users at the time of making account.

The above mentioned are the features that should be included in privacy protection of the website. As all mentioned features are personnel for every user and should be protected from hackers.

3 0
3 years ago
Drag each label to the correct location on the image.
andrezito [222]

Answer:

1.) Relative cell reference - A1

2.) Absolute cell reference - $D$2

3.) Mixed cel reference - $D2

Explanation:

In Microsoft Excel, cell references are very important and critical when dealing with formula. They can give you what you’re looking for or make your entire worksheet incorrect.

A cell reference is a cell address or a range of cell addresses that can be used in a formula.

There are three types of cell references and they are;

a) Relative reference

b) Absolute reference

c) Mixed reference

A relative cell reference is a cell reference that changes when you copy the formula to other cells. It s usually just a normal cell reference like A1, B2, C3. If a formula with a relative cell reference is copied down to other cells, the formula will change. That is a formula with a relative cell reference changes with respect to the cell which it is copied to.

An absolute reference does not change when you copy the formula to other cells. In absolute references, the dollar sign $ is used to “lock” both the row and column so that it does not change when it is copied to other cells. An example is $D$2.

Using a mixed cell reference, one is trying to see that only either the row or column changes with respect to other cells when they are copied. It is like “locking” either the column or the row while changing the other. Just like from the example, $D2 is a mixed cell reference where only the column is locked such that only the row changes when the formula is copied to other cells.

7 0
3 years ago
A site structure that contains multiple links to individual pages, allowing visitors to go through multiple paths to the site is
DanielleElmas [232]

Answer:

A site structure that contains multiple links to individual pages, allowing visitors to go through multiple paths to the site is called <u>Multidimensional website architecture</u>

Explanation:

There are different types of website architecture. One of them is multidimensional website architecture. In Multidimensional architecture, Multiple links of the websites pages are given on the a page and each page contain the multiple links of the website. in this architecture from any page of the website we can access the other page of the website.

for example

On Wikipedia, we search some topic named as website architecture, the website architecture shows on the screen. On this page, there are different link of pages such as sequential website architecture, multidimensional website architecture and Hierarchical website architecture. If click one of the link such as Hierarchical website architecture, the page of Hierarchical website architecture will open and show on the screen. This page also contains different pages links. These links may include the main page link of website architecture. This is called Multidimensional Architecture.

7 0
3 years ago
Rest or take a break every __ minutes when typing. Please help!
Talja [164]
Maybe like 3-5 I think im right
3 0
3 years ago
Read 2 more answers
Other questions:
  • Temporary storage location for cutting and pasting
    9·1 answer
  • Another html/css assignment, drop css code below, thank you
    15·1 answer
  • 1. What is Java SE?
    11·2 answers
  • Where does a computer store it’s information
    11·1 answer
  • If your microwave oven is a computer, define its Operating System and User Interface.
    12·1 answer
  • Explain logic circuit​
    8·1 answer
  • 3. The following is a dump of a UDP header in hexadecimal format. 0045DF000058FE20 a. What is the source port number? b. What is
    15·1 answer
  • Can you please help me
    9·1 answer
  • Multiple choice:
    12·2 answers
  • If each integer occupies one 64-bit memory cell and is stored using sign/magnitude notation, what are the largest (in terms of a
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!