1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elina [12.6K]
3 years ago
6

The information security organization performs a significant role in the implementation of solutions that mitigate risk and cont

rol solutions. Because the security organization institutes the procedures and policies to be executed, they occupy role of ____________________.
Computers and Technology
1 answer:
sergiy2304 [10]3 years ago
6 0

Answer:

Subject matter experts

Explanation:

Because the security organization institutes the procedures and policies to be executed, they occupy the role of Subject matter expert.

A subject matter expert is a person with a thorough and deep knowledge of a particular process, function, technology, machine, material or type of equipment. Such a person is an expert on that subject.

Therefore the information security organization occupies the role of Subject matter expert.

You might be interested in
Select the correct answer from each drop-down menu. Which IF formulas are valid? _____ and _____ are valid IF formulas.
Lyrx [107]

Answer:

=IF(D3>50; E3; F3) AND =IF(A1>60;"Pass";"Fail")

Explanation:

An IF structure is built following this pattern:

IF(TEST;IFTRUE;IFFALSE)

These are the only options in the given drop-down menus what comply with this pattern.  All others are not following this pattern.

The computer will do the test and if the result is true will apply the IFTRUE value, otherwise will apply the IFFALSE value.

4 0
3 years ago
What determines gravitational pull?<br><br> volume<br><br> mass<br><br> the sun<br><br> acceleration
Arte-miy333 [17]
C. The sun is correct!
8 0
2 years ago
Read 2 more answers
A(n) ____ is software that can be used to block access to certain Web sites that contain material deemed inappropriate or offens
serious [3.7K]

Answer: <em>Internet filter</em>

Explanation:

Internet filters are referred to as software which prevents individuals from accessing certain kind of websites. These filters are predominantly used in order to block content that might be considered inappropriate for some users. These filters are widely used in public library and computers used by schools and colleges.

4 0
3 years ago
A student is having trouble finding enough time in his busy schedule to work on his school science project. He has a demanding s
Katena32 [7]

Answer:c

Explanation:

got it rii

3 0
3 years ago
Read 2 more answers
Create a bulleted list of four descriptive terms describing possible values a person may have. These may be your own values, or
Minchanka [31]
Create a bulleted list of four descriptive terms describing possible values a person may have.

* always be true to yourself
* honesty is the best policy
* making mistakes leads you to solutions
* it's ok to be wrong
7 0
3 years ago
Other questions:
  • Hi <br> What exactly does this project want from me?thanks for riding
    5·1 answer
  • Janet manages the security of the database servers at the mortgage company where she works. The servers are Windows Server 2016;
    15·1 answer
  • vulnerability is a feebleness which allows an attacker to condense a system's information assurance to security,is it true or fa
    14·1 answer
  • PLEASE HELP!<br> How do you "brainliest" an answer?
    13·2 answers
  • "_____ devices improve memory by encoding items in a special way."
    13·1 answer
  • What is the 5 basic steps of computer programing?
    6·1 answer
  • Search engines enable you to
    12·1 answer
  • How do you think weather can affect sailing?<br><br>What would be good sailing weather?​
    9·1 answer
  • A variable is assigned a value on line 328 of a program. Which of the following must be true in order for the variable to work?
    12·2 answers
  • You are the IT security administrator for a small corporate network. The HR director is concerned that an employee is doing some
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!