1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rainbow [258]
3 years ago
5

Which element of the security policy framework requires approval from upper management and applies to the entire organization?A.

Policy.B. Standard.C. Guideline.D. Procedure.
Computers and Technology
1 answer:
Sav [38]3 years ago
8 0

Answer: A) Policy

Explanation:

Security policy framework is the regulations that are links the information security of an organization with the professionals and business .It maintains the responsibilities and documentation with security .

  • Policy is the document containing expectation,importance, requirement and scope of an organization about security .This security plan is high level document that need to be approved by higher management for implementation in company.
  • Other options are incorrect because standard principles, guidelines in form of regulation and procedure is the manner that is not required for to be permitted by higher management for being implemented on the business organization.
  • Thus the correct option is option(A).
You might be interested in
Five indicators of computer illiteracy​
melisa1 [442]

1. Isn't fluent in "geek language"

2. Doesn't know how to use a web browser and it's features

3. Doesn't understand what a computer is and how it works

4. Doesn't know the basic parts of computer hardware

5. Doesn't know how to use a computer or any other electronics

8 0
3 years ago
In video game development, the person who oversees and directs the entire design team and is the key vision keeper is
Sav [38]

Answer:

The Lead Designer

Explanation:

The Lead designers main role is to oversee how a game looks and is played. They manage a, normally small, design team. They work with them to come up with many aspects of the game itself like; characters, props, and plots to the game. they also, makes sure that the team itself stays on track, is within budget, and meets the designated deadlines.

3 0
3 years ago
What specific type of DNS query instructs a DNS server to process the query until the server replies with an address that satisf
NeX [460]

Answer: a)Recursive

Explanation: Recursive DNS( Domain Name System) is the server that support the DNS servers in authority.They help in the management of the load that gets produced by the requests from the user. The load  is managed by splitting/distributing so that the website requests becomes supportive and load can be relieved.

Other options are incorrect because they don't revert with the query message   for the DNS servers processing .Thus, the correct option is option(a).

6 0
3 years ago
which programming paradigm do programmers follow to write code for event driven applications? a. object oriented programming. b.
7nadin3 [17]

Answer:

D) Procedural

Explanation:

7 0
3 years ago
Write an overloaded constructor for the Table class that will take a single argument for the color of the table Write a set meth
creativ13 [48]

Explanation:

Below is required code in java :-

public class Table{

   private String color;    //attribute to store the color of the table

   public Table(){    //default constructor

       this.color="";   //set a default blank color

   }

   public Table(String color){    //overloaded constructor

       this.color=color;    //set the color value equal to the parameter provided

   }

   public void setColor(String color){    //setter or mutator method

       this.color=color;    //set the color value equal to the parameter provided

   }

}

8 0
3 years ago
Other questions:
  • You create hidden form fields with the ____ element.
    9·1 answer
  • Why is it important to consider the readability of a Web page when selecting and applying a background color?
    12·1 answer
  • Which of the following best describes the Distribution Mix?
    15·1 answer
  • While you work on the customer’s printer, he continues chatting about his network and problems he’s been experiencing. One compl
    14·2 answers
  • Liam is a hacker who tries to access Wi-Fi signals while driving his car. What type of wireless network attack is this?
    9·1 answer
  • 0.005098 megaliters to liters. record your answer in whole liters
    7·1 answer
  • Now let's create a memo. The memo should include all parts of a memo, and these parts should appear in the correct order. In you
    9·1 answer
  • Match each method of communication with its intended purpose.
    14·1 answer
  • Name the factors which of the following resources relate to :
    7·1 answer
  • When running the following code:
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!