1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Wittaler [7]
4 years ago
12

A common method of grouping security risks and security safeguards (controls) is to organize them into logical _________________

_ whose components share common characteristics.
a. System access policies
b. WANs segmented networks
c. Domains
Computers and Technology
1 answer:
satela [25.4K]4 years ago
5 0

Answer:A-system access policies

Explanation:

You might be interested in
The methods of the Character class that begin with ____ return a character that has been converted to the stated format.
Pavel [41]

Answer:

most probably the answer is 'to'

6 0
3 years ago
Pls help! 7th grade pythin fyi
larisa [96]

Answer:

There should be a colon at the end of the if statement, ie:

<h2>if x > 100:</h2><h2>  print("...")</h2>

8 0
3 years ago
Discuss similarities and differences between the software development and video game development processes.
Eduardwww [97]

Answer:

video games are used with qraphecs and software is compute

Explanation:

6 0
3 years ago
I NEED TO FIND OUT THE ANSWER!
vladimir1956 [14]

Answer:

the first action that should be taken is to back up the all important document that and by finishing doing that format the entire system...and i advise you should be choosing the best antivirus to protecting your computer

7 0
3 years ago
Which of the following data structures can erase from its beginning or its end in O(1) time?
jekas [21]

Where all "the following" i can help you but you said which of the folllowing and ther no picture or anything?

3 0
3 years ago
Other questions:
  • What was the first<br> 1:search engine<br> 2:website<br> 3:time the internet started
    6·1 answer
  • How do you know if the website is secure if you make a purchase
    13·2 answers
  • Someone who participates online for social reasons usually has a:
    9·1 answer
  • Label 14 parts of the inside of a computer
    6·1 answer
  • One of the following is NOT a type of Intellectual Property
    7·1 answer
  • I have put the question in twice and I cannot get a answer for it .. this site isn’t great in my view..
    9·1 answer
  • Pls help me computer science discoveries
    5·1 answer
  • Characteristics of first generation computers​
    9·1 answer
  • Work with a partner to answer the following question: How might learning the language
    13·1 answer
  • What is the importance of server modules and add-ons?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!