1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
guajiro [1.7K]
4 years ago
13

Which of the following domains do NOT need software vulnerability assessments to mitigate risk from software vulnerabilities?A.

User DomainB. LAN DomainC. Workstation DomainD. System/Application Domain
Computers and Technology
1 answer:
aliya0001 [1]4 years ago
5 0

Answer:

I dont think that these four do not need because When we are discussing risk management, you can examine domains separately. Each domain represents a specific target. Some attackers have the skill they focus on the User Domain. Other attackers may be experts in particular applications, so they focus on the System/Application Domain. Similarly LAN and Workstation Domain.

Explanation:                                                        

When a threat exploits a vulnerability it is a loss. The impact determine the severity of the loss. A threat is  potential to cause a loss.  Threat as any activity  represents a possible danger. Threats  cannot be destroyed, but they  controlled. Threats have independent probabilities.For example, an attacker  attacking Web servers hosted on Apache. There is a company that can stop this attacker from trying to attack. A company can reduce or eliminate vulnerabilities . Threats are  exploit vulnerabilities that result in the loss of confidentiality, integrity, or availability of a business asset. In other words, risks to confidentiality, integrity, or availability represent potential loss to an organization. Because of this, a significant amount of risk management is focused on protecting these resources.            

           

You might be interested in
Once I install my secondary hard drive what two tasks need to be done?
Vlada [557]
What is the use for the secondary hard drive?

If it is to run another operating system, such as a Linux flavour or another version of Windows, you would need to:

1) correctly format your drive

2) Install your OS

If you are using the HDD alongside your current OS, you need to:

1) Lower the boot priority of that drive in your BIOS

2) Format your hdd for use in your OS.

(Use NTFS for Windows and HFS+ for OS X)
3 0
3 years ago
During the _____ of the systems development life cycle (SDLC), an information system is operating, enhancements and modification
Neporo4naja [7]

Answer:

Maintenance Phase

Explanation:

One of the concepts employed in project management for describing stages involved when carrying out an information system development project is the systems development life cycle (SLDC). The cycle which starts from carrying out a feasibility study and ends in maintenance is a highly used conceptual model. There are 5 major stages or phase and they are the; Requirement Phase, Design Phase; Implementation Phase, Test Phase, and the Maintenance phase. The maintenance phase comes when testing has been complete and all enhancement and modifications have already been developed, and the system is operating.

5 0
3 years ago
Part B - Find the solutions for the following Case Study Real World Problems by applying the appropriate concepts that you learn
Monica [59]

Answer:

ok very surprised to hear that

5 0
3 years ago
What is the ascii code for the letter D
PilotLPTM [1.2K]

Answer:

068

Explanation:

Or if you want binary it's 01000100

4 0
3 years ago
A wireframe is a sketch detailing where text and images will be placed on a website. T/F
kirill115 [55]
Your answer would be true. 
3 0
3 years ago
Other questions:
  • When you see ##### in a cell, you should A. increase the cell width. B. increase the cell height. C. decrease the cell width. D.
    14·1 answer
  • Which button would you use to quickly add addresses to a mail merge envelope?
    5·1 answer
  • Which program can damage your computer
    13·2 answers
  • Write a method reverse( ) for OurLinkedList class. The method should return a new OurLinkedList object that is the reverse of th
    8·1 answer
  • When Mark’s organization implemented an IS, they faced the lack of confidence in users. Which strategy can improve user confiden
    11·1 answer
  • Using either a UNIX or a Linux system, write a C program that forks a child process that ultimately becomes a zombie process. Th
    8·1 answer
  • What are the methods of identifying publicly switched networks?
    14·1 answer
  • HELP PLS
    5·2 answers
  • Tips for staying safe using social media. Using in your own words.
    6·1 answer
  • ________ helps in determining the cause of a security threat in an incident response plan. Question 7 options: A) Restricting sy
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!