1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rainbow [258]
3 years ago
5

Which element of the security policy framework requires approval from upper management and applies to the entire organization?A.

Policy.B. Standard.C. Guideline.D. Procedure.
Computers and Technology
1 answer:
Sav [38]3 years ago
8 0

Answer: A) Policy

Explanation:

Security policy framework is the regulations that are links the information security of an organization with the professionals and business .It maintains the responsibilities and documentation with security .

  • Policy is the document containing expectation,importance, requirement and scope of an organization about security .This security plan is high level document that need to be approved by higher management for implementation in company.
  • Other options are incorrect because standard principles, guidelines in form of regulation and procedure is the manner that is not required for to be permitted by higher management for being implemented on the business organization.
  • Thus the correct option is option(A).
You might be interested in
A___________is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its
Molodets [167]

Answer: rootkit

Explanation:

Hi, A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.

A rootkit provides continued privileged access to a computer while hiding its presence. Because of this hiding characteristic it is very difficult to detect.

Once a rootkit has been installed, it allows someone to have total remote control of a computer and do things such as files executions and system changes.

4 0
3 years ago
1. Conflict resolution is the process of solving disputes and disagreements.
gtnhenbr [62]
1. Conflict resolution is the process of solving disputes and disagreements.

A. True


2. Project managers have the overall responsibility for planning, executing, and completing a project.

A. True


3. Read the following scenario:

A project will require more people than originally estimated.

Identify the possible risks to the project.

B. Money and resources


4 0
3 years ago
What is stand-alone LDAP server?
FinnZ [79.3K]

Answer:

A stand-alone LDAP server is defined as to remove the load from a server that does multi function tasks. It is more efficient when we use one or more LDAP configurations .

Light weight Directory Access Protocol (LDAP) is a client and server protocol used for accessing directory data. It  helps in reading and editing the directories over IP networks and runs directly over Transmission control protocol and internet protocol used simple string format for transferring of data.

8 0
3 years ago
Which of the following is a malicious program that can replicate and spread from computer to computer?
Marina CMI [18]
An email, duh!

lol j.k def not email, it is a virus.

a trick to remembering this is that a virus can make you and computer sick. 

5 0
4 years ago
Read 2 more answers
What types of tasks can you complete using Microsoft Excel (name and describe at least 3)
FrozenT [24]

Answer:

1) Data Entry and Storage. ...

2) Accounting and Budgeting. ...

3) Collection and Verification of Business Data. ...

4) Scheduling. ...

5) Build Great Charts. ...

6) Help Identify Trends. ...

7) Administrative and Managerial Duties. ...

9) Return on Investment.

8 0
3 years ago
Other questions:
  • Which WAN technology is designed to work with a variety of commonly used layer-2 protocols and is sometimes called a layer-2.5 t
    15·1 answer
  • Which of the following is NOT a valid declaration for a character string?
    8·1 answer
  • Given the following structure and variable definitions, struct customer { char lastName[ 15 ]; char firstName[ 15 ]; unsigned in
    6·1 answer
  • A deluxe meal, represented by a DeluxeMeal object, includes a side dish and a drink for an additional cost of $3. The DeluxeMeal
    14·1 answer
  • It is where the home tab is located where you can view all the all the formatting purpose <br>​
    11·1 answer
  • Describe 6 difference of the types of computer<br>​
    13·1 answer
  • Which Operating System is used most often in households?
    6·2 answers
  • Why when I send a message on iOS it says the person’s notification is silenced, and the message isn’t delivered?
    14·1 answer
  • A program that performs handy tasks, such as computer management functions or diagnostics is often called a/an ____________.
    8·1 answer
  • What are the advantages of hybrid computer
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!