1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
umka21 [38]
3 years ago
7

While these two approaches have similarities in terms of the topics they address, ________ will cover broad IT management topics

and specify which security controls and management need to be installed; however, ________ does not address how to implement specific controls.
Computers and Technology
1 answer:
Viefleur [7K]3 years ago
6 0

Answer:

The answer to this question is "COBIT and ISO".

Explanation:

  • The COBIT is a management tool, that provides a framework, which guarantees to information system to complete any process. It mainly uses in the business, scientific researches, for decision making.
  • In terms of security management the ISO is used, It is a framework that involves a risk management strategy, and attempts companies, which need to define or select suitable mechanisms to deal with data security.

That's why the given option is correct.

You might be interested in
What can Strings store
horsena [70]
A string is generally considered as a data type and is often implemented as an array data structure of bytes (or words) that stores a sequence of elements, typically characters, using some character encoding. String may also denote more general arrays or other sequence (or list) data types and structures.
5 0
4 years ago
Read 2 more answers
To get a page from the Web, a user must type in a URL, which stands for: a. Unknown Resource Locator b. Unknown Router Location
Afina-wow [57]

Answer:

Hey! The answer you're looking for is D. Uniform Resource Locator.

3 0
4 years ago
In the code below, what's the final value of the variable x?
Lana71 [14]

Answer:

First equation x=4

second equation x=3

Explanation:

The question is telling us that 'X' is equal to 8. It's another way of representing this number using X as the variable replacing it.

We input 8 instead of the X to solve the equation, and here in the picture, you can see where I went from there.

Do the same thing for the other equation.

I hope this helps :)

3 0
3 years ago
WILL MARK BRAINLIEST.....
slamgirl [31]

Answer:

Variables. A variable is a way of naming and storing a value for later use by the program, ... its type, and optionally, setting an initial value (initializing the variable). ... byte x; x = 0; x = x - 1; // x now contains 255 - rolls over in neg. direction

Explanation:

7 0
4 years ago
A network administrator had his entire network converted into a botnet. Which type of malware infection is most likely responsib
Scorpion4ik [409]

Answer:

worm

Explanation:

Computer worm -

It is a malware program which is illegally or secretly added to the system of the host computer , and then further multiplies and spread to other computer , is known as a computer worm.

Worm can very cause a huge harm to the network of the computer.

Hence, from the given scenario of the question, the correct term for the given information is computer worm .

5 0
4 years ago
Other questions:
  • Semiconductor memory is used mainly for primary storage even with its high cost. In another hand, the magnetic tape is the cheap
    6·1 answer
  • Because public key encryption requires the use of two different keys, it is also known as _____ encryption
    13·1 answer
  • Simple mail transfer protocol (smtp) uses the well-known port number ______________ by default.
    14·2 answers
  • Managers looking for advice on properly dealing with obsolete technology hardware can: a) consult the e-Stewards program b) seek
    9·1 answer
  • Explain how to number text in a document​
    7·2 answers
  • FREE BRAINLIEST!!!
    14·2 answers
  • Choose the correct answer
    6·1 answer
  • Consider the following implementation of a search method:
    13·2 answers
  • Write a Pascal program that will prompt the user to enter the radius of a circle.
    9·1 answer
  • a network administrator for a large oil company has discovered that a host on the company network has been compromised by an att
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!