1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bagirrra123 [75]
3 years ago
6

Which of the following are documents that can help you to review and assess your organization’s status and state of security? Fi

rewall checklists Risk assessment STIGs (Security Technical Implementation Guides) Incident response plan
Computers and Technology
1 answer:
pashok25 [27]3 years ago
7 0

Answer: Incident response plan

Explanation: Incident resource plan is the strategy that is created in the form of plan in the information technology (IT) department. This plan is made for the detection of the staff, issue or problem that arise, loss of data etc. This plan works in the situations like cyber-crime, data hacking etc.

Other options are incorrect because they done have any well defined strategy for the hacking or attacking situation rather control the security issues. Thus the correct option is incident response planning.

You might be interested in
What do you think are the IPO components in an online movie ticket booking system?
zalisa [80]

Explanation:

Online Movie Ticket Booking System is a website to provide the customers facility to book tickets for a movie online and to gather information about the movies and theaters. Customer needs to register at the site to book tickets to the movie

Advantages of Online Booking Systems

Your business is open around the clock. ...

You can maximize reservations. ...

You get paid quicker. ...

You're not tied to a phone. ...

You can effortlessly up-sell add-ons. ...

It's easy to manage your calendar. ...

You get valuable insight about your business

4 0
2 years ago
Ethernet ensures that _____ on a shared network never interfere with each other and become unreadable.
Dmitry [639]

Answer:

Signals.

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

Ethernet ensures that signals on a shared network never interfere with each other and become unreadable through the use of encapsulation and standard encryption protocols.

In Computer Networking, encapsulation can be defined as the process of adding a header to a data unit received by a lower layer protocol from a higher layer protocol during data transmission. This ultimately implies that, the header (segment) of a higher layer protocol such as an application layer, is the data of a lower layer such as a transportation layer in the Transmission Control Protocol and Internet Protocol (TCP/IP).

The TCP/IP model comprises of four (4) layers;

1. Application layer: this is the fourth layer of the TCP/IP model. Here, the data unit is encapsulated into segments and sent to the transport layer.

2. Transport layer (layer 3): it receives the segment and encapsulates it into packets and sends to the internet layer.

3. Internet layer (layer 2): packets are encapsulated into frames.

4. Network layer (layer 1): frames are then converted into bits and sent across the network (LAN).

Hence, the data unit encapsulated inside a packet is known as segment, which is typically referred to as packet segmentation.

Additionally, these data, segments, packets, frames and bits transmitted across various layers are known as protocol data units (PDUs).

8 0
2 years ago
What is instance variable??​
azamat

Explanation:

a distance variable includes a value and a dependency. includes a value and a dependency

5 0
3 years ago
What are the charactaristic of computer with virus​
NISA [10]

Explanation:

One of the main characteristics of computer viruses is related to the fact that they are programs created by hackers that attack the code of a computer, infecting files on the computer's hard drive or its source code. Once the virus has been copied onto the computer, it can contaminate other computers that come into contact with the machine.

5 0
2 years ago
Read 2 more answers
HELP ASAP!!!! PLEASE !!! What information does the Media Access Control (MAC) on a network card provide?
sladkih [1.3K]

Answer:

3. the company that installed the network card into the computer's motherboard

3 0
3 years ago
Read 2 more answers
Other questions:
  • What type of system security malware allows for access to a computer, program, or service without authorization?
    5·1 answer
  • A hidden backlog contains the projects that the IT department is not aware of because of low feasibility.
    13·1 answer
  • Write a program that asks the user to input
    11·1 answer
  • Erik is the president and owner of Watch Out, a local website development company that helps clients create and build unique web
    15·1 answer
  • Which of these is the fastest transmission medium?
    11·2 answers
  • PLZZZZZ help will give brainleist <br> Two common sound files are?
    11·1 answer
  • Porque es importante la tecnología?​
    8·1 answer
  • In what ways is the human brain like a computer? In what ways is it different?
    14·2 answers
  • It is a single strand of metal capable of transmitting power or data from one area to<br> another
    11·1 answer
  • A(n) ____ describes the structure, content, and access controls of a physical data store or database.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!