1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andreyy89
4 years ago
8

Which type of document sets overall direction for an information security program? (Actively manage risk, consider compliance an

d regulatory requirements, layered compensating controls, etc.)
Policy

Process

Strategy

Guideline
Computers and Technology
1 answer:
denis23 [38]4 years ago
6 0

Answer: Policy

Explanation:

 The information security policy is the type of the document which sets the overall direction for the information security program. This program is in the form of documentation where it include all the information of the organization about the security policies, guidelines, standard and the procedure.

 The main principle of the security program is that it provide the integrity, availability and the confidentiality in terms of the information security. It also helps in protecting the various confidential data.

Therefore, policy is the correct option.

You might be interested in
Consider an application that transmits data at a steady rate (for example, the sender generates an N-bit unit of data every k ti
grin007 [14]

Answer:

a; circuit-switched network.

b; No, it does not need congestion control.

Explanation:

For A;

A circuit-switched network is a better option for this application. This is because of the fact that the application is made up of long sessions with smooth data transfer capacity needs.

The transmission rate is known, and does not transmit in short intervals(short signals), every application session can have a bandwidth reserved without significant bandwidth wastage.

Also, the overhead expenses of setting up and tearing down connections are canceled out over the extensive period of running an application session.

For B;

If the packet-switched network is used, and traffic in the network comes from the said application. Even if every applications transmit one or more network connections. Still, we already know that every connection has enough transmission capacity to handle majority of the application data rates, no congestion(insignificant queuing) will happen.

This goes to say that no congestion control will be needed given such broad-based connection.

7 0
4 years ago
OSI layer for HDLC??​
tresset_1 [31]

Answer:

HDLC is one of the most commonly used internet protocols (IP) in what is Layer 2 of the industry communication reference model called Open Systems Interconnection (OSI).

Explanation:

3 0
3 years ago
A ____________ would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a____________
Lynna [10]

Answer:

vulnerability, risk

Explanation:

A vulnerability would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a risk is a combination of the likelihood that such a misconfiguration could happen, a hacker’s exploitation of it, and the impact if the event occurred.

6 0
3 years ago
Which of the following is a requirement for the Safety Data Sheet (SDS)?​
Natasha_Volkova [10]
What are the options?
4 0
3 years ago
You are called to assist in troubleshooting a network problem that has occurred soon after a significant IPv6 implementation. So
HACTEHA [7]

Answer:i dont kowe

Explanation:

5 0
3 years ago
Other questions:
  • Jack wants to store a large amount of data on his computer. He chooses to use a database for this purpose. What is a database? A
    8·1 answer
  • When a Firewall is a hardware interface, it is referred as a
    6·1 answer
  • What inventor patented the first american movie projector
    15·2 answers
  • An example of live footage is when?
    10·2 answers
  • 3) An example of interactive web page is<br>​
    11·1 answer
  • Which of the following is considered to be intellectual property?
    9·1 answer
  • What are three softwares for cloud computing
    8·1 answer
  • Can you help me with my homework what should i do
    9·1 answer
  • You can merge the cells using the rowspan and colspan attribute of the tag <br> true or false​
    7·1 answer
  • write a function named get majority last name that accepts as its parameter a dictionary from strings to strings the keys of the
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!