1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bagirrra123 [75]
3 years ago
6

Which of the following are documents that can help you to review and assess your organization’s status and state of security? Fi

rewall checklists Risk assessment STIGs (Security Technical Implementation Guides) Incident response plan
Computers and Technology
1 answer:
pashok25 [27]3 years ago
7 0

Answer: Incident response plan

Explanation: Incident resource plan is the strategy that is created in the form of plan in the information technology (IT) department. This plan is made for the detection of the staff, issue or problem that arise, loss of data etc. This plan works in the situations like cyber-crime, data hacking etc.

Other options are incorrect because they done have any well defined strategy for the hacking or attacking situation rather control the security issues. Thus the correct option is incident response planning.

You might be interested in
In one sentence, how would you sum up the internet?
Slav-nsk [51]

Answer:

an informational system

Explanation:

6 0
3 years ago
Read 2 more answers
A recent antivirus scan on a server detected a Trojan. A technician removed the Trojan, but a security administrator expressed c
BabaBlast [244]

Answer:

B. Spyware

Explanation:

Spywares are silent software that steals sensitive information such as internet or company data, and other similar information. They are oftentimes unnoticed and supply stolen data to external users, data centers or advertisement companies.

Sophisticated spyware can go as far as installing software to manipulate your settings or use passwords on your behalf.

Even though the Trojan was detected in our scenario, The Trojan would have created a backdoor to allow spyware in. This spyware will not be easily noticed by the technician or the antivirus, however, it could be more devastating than the Trojan.

That is why the security administration expresses concern over a breach despite the removal of the Trojan.

3 0
3 years ago
You have purchased a new LED monitor for your computer. On the back of the monitor, you see the following port (pictured below).
kati45 [8]
There's no picture however the cable might be a HDMI since it's commonly used
8 0
2 years ago
Alice has 1/5 as many miniature cars as Sylvester has slyvester has 35 miniature cats how many miniature cars dose Alice have
garik1379 [7]
Alice has 7 miniature cars
5 0
3 years ago
What is also known as a visual aid in a presentation?
Katyanochek1 [597]
Visual aids are defined as charts, pictures or images that help to make a point or enhance a presentation, so I would say B. animation.

Hope this helps!!
4 0
3 years ago
Read 2 more answers
Other questions:
  • How can you best utilize CSS for Web Development?
    6·1 answer
  • What aspect of the internet makes it fault-tolerant?
    6·1 answer
  • Kyra needs help planning what images and text to use in her web page what technique can help her
    5·2 answers
  • Bulleted and Numbered List button appear in the ………….. Toolbar.​
    6·1 answer
  • The move toward access instead of ownership is a sign of collaborative consumption.
    5·1 answer
  • To remove an embedded chart, you should _____ it and press the DELETE key. (Points : 2) move drag hide click
    15·1 answer
  • 7.5 Code practice Plz answer ASAP
    15·1 answer
  • I am not a living being, I am a cylindrical shape that has three to eight sides. I never die. I can build anything again. What i
    5·1 answer
  • One of your start-ups uses error-correcting codes, which can recover the original message as long as at least 1000 packets are r
    8·1 answer
  • Large and fast disks should be used for as doing so will ensure work is done as quickly as possible?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!