1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
son4ous [18]
3 years ago
14

Prepare a risk assessment report (RAR) with information on the threats, vulnerabilities, likelihood of exploitation of security

weaknesses, impact assessments for exploitation of security weaknesses, remediation, and cost/benefit analyses of remediation.
Computers and Technology
1 answer:
OlgaM077 [116]3 years ago
5 0

Answer:

See attached file

Explanation:

Download docx
You might be interested in
Consider sending a 10000-byte datagram into a link that has an MTU of 4468 bytes. Suppose the original datagram is stamped with
AfilCa [17]

Answer:

Number of fragments is 3

Explanation:

The maximum size of data field in each fragment = 4468 - 20(IP Header)

= 4448 bytes

Hence, the number of required fragment = (10000 - 20)/4448

= 3

Fragment 1

Id = 218

offset = 0

total length = 4468 bytes

flag = 1

Fragment 2

Id = 218

offset = 556

total length = 4468 bytes

flag = 1

Fragment 3

Id = 218

offset = 1112

total length = 1144 bytes

flag = 0

5 0
3 years ago
Four ways to improve the performance of a hard disk include.
erik [133]

Answer:

Defragmenting, and optimizing, also on Windows to not use Paging unless you have an SSD. And to install a lightweight OS like Windows 11 super-lite, Linux etc.

7 0
2 years ago
Which of these lights is NOT part of the standard three-point lighting setup?
Contact [7]

Answer:

i believe background lighting

8 0
3 years ago
What is an effective technique for searching the web? Choose one.
kakasveta [241]
Option B is what i would say 

if you are searching something and want a specific answer you are going to need to be specific on how you search it
4 0
3 years ago
Read 2 more answers
One example of how psychological research can be used to control harmful behavior would be __________. A. fooling individuals th
Sati [7]

The results of a psychological research can be used for malignant purposes, such as fooling individuals through their emotions, using propaganda to change beliefs, and manipulating others through the media.

But it can also be used for good – which is what the question is asking. It is clear that from the available options, only (D) improving communication and relationships are an example of how psychological research is used for good.

8 0
3 years ago
Read 2 more answers
Other questions:
  • The process of changing a program’s internal structure without changing the way the program works is ______________.
    13·1 answer
  • Was the big blue button thing a good decision or bad?<br> *I think it was a bad idea.
    15·2 answers
  • Put these steps for managing your study time in chronological order. 1 set aside the same time each day 2 Identify the best time
    14·1 answer
  • In order to organize your work effectively on the computer, where is the best place to save it?
    14·2 answers
  • Write a Python program string_functions.py that defines several functions. Each function re-implements Python's built-in string
    9·1 answer
  • How do you copy a file​
    9·1 answer
  • Which of the following is a productivity strategy for collaboration?
    9·1 answer
  • Write the importance of program in computer​
    9·1 answer
  • What does business informWhat does business information management do?
    12·1 answer
  • What is the purpose of the GETPIVOTDATA function?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!