1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Scrat [10]
4 years ago
10

In the absence of a cybersecurity theory, we have security standards, frameworks and best practices. An example of best practice

s is:______
a. to use a password of a certain composition and strength, such as minimum 8 characters
b. to specify the use of NIST cybersecurity framework for Federal Government computers
c. to have product specs written by vendor on every security product or in a document
d. to use Cisco Security Framework
Computers and Technology
2 answers:
Eduardwww [97]4 years ago
8 0

Answer:

The correct option is;

b. To specify the use of NIST cybersecurity framework for Federal Government computers

Explanation:

The NIST cyber security framework comprises guidelines, guidance and best practices developed to the cybersecurity of critical infrastructure thereby minimizing cyber risks and enhancing reliability of vital infrastructures

The framework is a non-mandatory requirements developed by NIST in collaboration with industry stakeholders that considers, cost-efficiency adaptability and repeatability as being of primary importance.

Galina-37 [17]4 years ago
7 0

Answer:

a. to use a password of a certain composition and strength, such as minimum 8 characters.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

In the absence of a cybersecurity  theory, we have security standards, frameworks and best practices.

An example of best practices in cybersecurity is the use of a password of a certain composition and strength, such as minimum 8 characters. This would ensure there's a formidable wall to protect data and an unauthorized access or usage of the system network.

You might be interested in
In cell h15 enter a vlookup function to determine the 2018 percentage of total attendance for the city listed in cell h14. Use t
Amanda [17]

Answer:

=vlookup(h14, a5:h11,8,false)

Explanation:

Here, h15 is the cell in which we need the output and the value to be matched in rows to find the exact row is h14, and the range is expressed as a5:h11. Now to find the column number, we need to figure out the first and the concerned column. So, the concerned column is in which the total attendance is being listed and it is h(h14), and the first column is a. So, the column number is a=1 h=8, =8. And since we need the exact match, the value of the fourth argument is false. And thus, we have the above formula. Remember. vlookup formula is:

=vlookup(cell where the result is to be placed, range, column number in the same row as h14, exact match or approximate match). For exact match it's false, and for the approximate match, it's true.

8 0
3 years ago
In order to install a device, the operating system needs the required __________ for that device.
JulsSmile [24]
Any answer choices to help out??
7 0
4 years ago
Read 2 more answers
A security administrator wants to empty the DNS cache after a suspected attack that may have corrupted the DNS server. The serve
MAVERICK [17]

Answer:

The easiest method to clear a DNS cache is to use either the command line, PowerShell or Windows Server's DNS Manager

Explanation:

You can use either the ipconfig /flushdns (command line), Clear-DnsClientCache (PowerShell) or DNS->(name)->Clear Cache (from the DNS Manager)

source:

https://activedirectorypro.com/clear-windows-dns-cache/

https://www.technipages.com/flush-and-reset-the-dns-resolver-cache-using-ipconfig

8 0
3 years ago
Read 2 more answers
Help ne please!! Even if I press 3 times it doenst work.. when I try to turn it off either. Any suggestions? (using ipad)​
arlik [135]

Answer: Have you tried restarting your ipad or Shutting down? Or closing your ipad and waiting for a little bit so It can leave Or you can try Pressing it harder.

Explanation:

Thats all I have to help

8 0
3 years ago
Write a function nexthour that receives one integer argument, which is an hour of the day, and returns the next hour. This assum
Vinvika [58]

Answer:

The function in C is as follows:

int nexthour(int tme){

   tme = tme%12 + 1;

   return tme;

}

Explanation:

This defines the function

int nexthour(int tme){

Ths calculates the next hour using % operator

   tme = tme%12 + 1;

This returns the next hour

   return tme;

}

5 0
3 years ago
Other questions:
  • Which of these is a typographical clue?
    9·2 answers
  • Why is the answer A?
    6·1 answer
  • Why is it a good idea to leave an interview being courteous and polite?
    10·1 answer
  • A colleague asks you to research a CPU for a new server that will run Windows Server 2019. He explains the server roles that he
    7·1 answer
  • How is the cia triad used to evaluate encryption methods?
    6·1 answer
  • Your ___ can provide hardware firewall protection for your home network where it connects to the ISP's network, just as ISP netw
    12·1 answer
  • What is a multipurpose network device?
    10·1 answer
  • A cpu handless all the instruction that it recieces from hard ware and software which are available on the computer true or fals
    7·1 answer
  • What are three sections in a work sheet accounting
    12·1 answer
  • Aaaaaaaaaaaaaaaaplssssssssssssssssssssssssssssshelpppppppppppppppppppppppp
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!