1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natali [406]
4 years ago
15

A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use.

Direct identifiers will not be collected; however, IP addresses may be present in the data set. Risk of harm should be evaluated by:
Both the magnitude (or severity) and the probability (or likelihood) of harm. T/F
Computers and Technology
1 answer:
Brilliant_brown [7]4 years ago
7 0

Answer:

True.

Explanation:

An investigator would like to do an internet-based college student survey to gather data regarding their behavior as well as drug use. Even so, specific identifications are still not gathered and IP addresses might be available in the set of data. Damage threat must be assessed both by the magnitude (or severity) and the likelihood (or likelihood) of the hurt.

You might be interested in
If cost of 1 kg sugar is 36 find price of 3 kg sugar​
SashulF [63]

Answer:

the answer is 108

Explanation:

3×36=108

7 0
3 years ago
How do I insert a row above the selected row in between row and row 2 revenue xls
Scorpion4ik [409]
I believe you go to the the tools selection or just click control alt space 
5 0
3 years ago
What does engine r0blox players use to make r0blox games
vovangra [49]

Answer: Lua programming

Explanation: i hope im right ?

5 0
3 years ago
An organization's IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the
djyliett [7]

Answer:

a. Remove the affected servers from the network.

Explanation:

An organization's incident response process (IRP) can be defined as all of the process involved in the cleanup and recovery of data when they fall victim to an attack or cybersecurity breach. The incident response process comprises of six (6) important stages and these are;

1. Preparation.

2. Detection and analysis (identification).

3. Containment.

4. Eradication.

5. Recovery.

6. Review of incident activities.

When an organization's IRP prioritizes containment over eradication and an incident is discovered, where an attacker outside the organization installed a crypto-currency mining software on the organization's web servers. Given the organization's stated priorities, the cybersecurity engineer should remove the affected servers from the network.

A containment process is focused on taking steps to eliminate or contain the attack. It basically involves acting swiftly in response to the attack, so as to prevent it from spreading across board or in order to mitigate the damage already caused.

In this context, the cybersecurity engineer should remove the affected servers from the network in accordance with the organization's IRP priority (containment).

<em>Furthermore, he could take a step further to contain the attack by installing a firewall and updating their policies in the Intrusion Prevention System (IPS) of the organization. </em>

5 0
3 years ago
What are other ways you could use the shake or compass code blocks in physical computing projects?
BabaBlast [244]

Answer:there are different ways of quick navigation between files and functions. ... You should use the menu 'Remove file from project' instead of deleting files. ... A Makefile generation tool for Code::Blocks IDE by Mirai Computing

7 0
3 years ago
Other questions:
  • Click _______ to view each individual record of a mail merge document.
    5·2 answers
  • How would a designer interpret the word denier?
    12·2 answers
  • Sequence encryption is a series of encryptions and decryptions between a number of systems, wherein each system in a network dec
    9·1 answer
  • Alice is working in a database containing the names, service locations, and services offered by landscapers. She needs to find l
    12·1 answer
  • What is versatility according to computer​
    11·1 answer
  • Use the drop-down menus to complete the steps to convert a macro to VBA.
    8·1 answer
  • It is important to consider the quality of the data being used when considering the accuracy of a conclusion. Incorrectly collec
    11·2 answers
  • patty works at Mcdonald's as a chef. it is her job to make hamburgers as each order arrives on her computer screen. one day patt
    11·2 answers
  • Which statements are true regarding mainframe computers? Mainframes are fast-performing computers that have large storage capaci
    8·1 answer
  • What should you try first if your antivirus software does not detect and remove a virus?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!