1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Klio2033 [76]
3 years ago
10

Three of the most important jobs of security management are to ensure _____ are organized according to sensitivity, ensure that

roles maintain _____, and to manage _____ because that is the enemy of security. assets, accountability, software assets, separation of duties, complexity software, separation of duties, complexity software, accountability, people people, separation of duties, technology
Computers and Technology
1 answer:
Leokris [45]3 years ago
4 0

Answer:

separation of duties, accountability, people

Explanation:

Three of the most important jobs of security management are to ensure separation of duties are organized according to sensitivity, ensure that roles maintain accountability, and to manage people because that is the enemy of security.

You might be interested in
A group of cells is called a<br><br> Excel
arsen [322]

Answer:

Every worksheet is made up of thousands of rectangles, which are called cells. A cell is the intersection of a row and a column. ... You can also select multiple cells at the same time. A group of cells is known as a cell range

8 0
3 years ago
Write a method that determines the total number of chars in each string of an array.
Serjik [45]
The total number of chars in each string is basically the size of each string.

Using JAVA:

        String[] arr = {"hello", "my", "name", "is", "Felicia"};                int count = 0;        for(int i = 0; i < arr.length; i++) {            count = count + arr[i].length();            System.out.println("Characters in " + arr[i] + ": " + count);        }

Output: 
<span>Characters in hello: 5
Characters in my: 7
Characters in name: 11
Characters in is: 13
Characters in Felicia: 20</span>


8 0
3 years ago
While troubleshooting a connectivity issue in your network, you did a Ping from Host A to Host B, and the Ping was successful. F
xeze [42]

Answer:

Above OSI Layer 3

Explanation:

5 0
3 years ago
Which of the following statement is true for Service Request Floods A. An attacker or group of zombies attempts to exhaust serve
klio [65]

Answer:

The answer is "Option A and Option B"

Explanation:

This is a type of attack, which is mainly used to bring down a network or service by flooding large amounts of traffic. It is a high-rate server from legitimate sources, where an attacker or group of zombies is attempting to drain server resources by creating and disconnecting the TCP link, and wrong choices can be described as follows:

In option C, It can't initiate a single request because when the servers were overloaded with legitimate source links, the hacker may then set up and uninstall TCP links.

7 0
3 years ago
What are three different reasons why people access networks? <br> Give an example of each reason
denpristay [2]

Communication: Communication is one way to be connected to the network and use the internet. It helps maintains communication with other network users. A few examples include email, IM services, video conferencing, Skype and many more.

File sharing: Easily sharing files and data. From businesses to schools to friends, everyone sends files to through internet and this has become an essential part of life. Various services like Gmail and yahoo mail are used.

Social networking: This is an essential medium to communicate with friends and family members. Examples include Facebook, Twitter, and Instagram.






3 0
4 years ago
Other questions:
  • In our networked world, we have more opportunities to stereotype, which is problematic because:
    7·2 answers
  • Arun is 5 years older than Anu. five years ago, the ratio of their ages was 3:2 . find their present age​
    10·2 answers
  • Anybody good with Microsoft excel? I need help with this class.
    9·2 answers
  • Which practice is the best option for desktop security? A. Make a unique user ID and password for each account. B. Change the pa
    9·2 answers
  • The length property of the String object returns
    15·1 answer
  • write a function that given an integer Y and 3 non-empty string A,B,W, denotingthe year of vacations, the beginning month, the e
    5·1 answer
  • What is the name of the file manager in Microsoft Windows?​
    5·1 answer
  • Marissa is designing a web page that features lessons on how to build cabinets. how can she make the page most engaging for the
    7·1 answer
  • Date... Page No I write program to the check whether the supplied number is prime or not using a function procedor​
    13·1 answer
  • Before u can open and edit a file, you need to zip it, T/F
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!