1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
algol13
3 years ago
11

A mentor can share personal successes and failures to show you what to do and what not to do.

Computers and Technology
1 answer:
mamaluj [8]3 years ago
7 0
True is the answer to your question
You might be interested in
The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or tra
Sergeu [11.5K]

Answer: Information security

Explanation:

 The information security is one of the system that keeps the data confidential, assure the integrity and also availability of the information or data.

This system is basically refers as the CIA triad in the information security system and the data risk management.

The main aim of the information security is that keeps the data protected from the unauthorized accessing and also  controlling the access in the system.

Therefore, Information security is the correct answer.

8 0
3 years ago
After discovering a security incident and removing the affected files, an administrator disabled an unneeded service that led to
patriot [66]

Answer:

A. Containment

Explanation:

  • This Containment is important before an incident or damage to resources. Most events require control, so it is important when handling each event. Containment provides time to develop a solution strategy that is prevalent.
  • Decisions Making decisions to facilitate an event is much easier if the decision is involved in predetermined strategies and processes. Organizations must define acceptable risks in dealing with events and develop strategies accordingly.
  • Network prevention is a fast and powerful tool designed to give security administrators the power they need to detect and prevent threats.
5 0
4 years ago
10. Select the correct answer.
Aleks [24]
B) licensing because they are giving Thomas permission to use the images
6 0
3 years ago
Read 2 more answers
Cole wants to copy the formatting from his first page to his second page using Format Painter. To copy the formatting to more th
steposvetlana [31]
C is the best answer
I hope it’s work
7 0
3 years ago
Question: 2
AleksandrR [38]

Answer:

The answer is C.) Molecules

I hope this helps! ^-^

7 0
3 years ago
Other questions:
  • Which of the following statements is false? a. Each object of a class shares one copy of the class's instance variables. b. A cl
    11·1 answer
  • One of the ways to create a horizontal navigation menu from an unordered list is to a. set the display property of the element w
    6·1 answer
  • The conflict between the user's goal for unfettered access to data and the security administrator's goal to protect that data is
    5·2 answers
  • What is that black thing on my wall?
    9·1 answer
  • There are several reasons it’s important to use the right tool and the right size tool for the job, but the most important reaso
    8·1 answer
  • How can a professional association help you reach your career goals?
    5·1 answer
  • 14. Blender® does not typically use pop-up boxes. (1 point)
    7·1 answer
  • Choose all the answers that apply.
    15·1 answer
  • You are network administrator for an Active Directory forest with a single domain. Then network has three sites with one domain
    12·1 answer
  • Which of the following is a key difference between a Windows 7 restore point and one you set yourself?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!