1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hoochie [10]
2 years ago
14

What is the first step in devising security services and mechanisms?

Computers and Technology
2 answers:
N76 [4]2 years ago
4 0

Solution:

The first step in devising security services and mechanisms is to develop a security policy.

A security policy is a document that states in writing how a company plans to protect the company's physical and information technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company's assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made.

This is the required answer.

erastovalidia [21]2 years ago
4 0

Solution:

The first step in devising security services and mechanisms is to develop a security policy.

A security policy is a document that states in writing how a company plans to protect the company's physical and information technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company's assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made.

This is the required answer.

You might be interested in
A person who creates a computer virus is a (1)system analyst (2) techician(3) programmer​
mars1129 [50]

Answer:

a person who creates a computer virus is a programmer

8 0
2 years ago
Read 2 more answers
As the performance of PCs steadily improves, computers that in the past were classified as midrange computers are now marketed a
taurus [48]

Answer: PC servers

Explanation: PC(Personal computer) servers are the helps in the utilization of the network services to the software and hardware of the computer. It manages the network resources . In the past time ,Mindrange computers, mini computers etc are present time's PC servers.

Other options are incorrect because laptops ,PDA(Personal digital assistant) or tablets are the modern version of the computer units that are portable and compact with fast processing. Thus the correct option is option PC servers.

5 0
3 years ago
802.11ac provides an advantage over 802.11n by incorporating increased channel bonding capabilities. What size bonded channels d
bulgar [2K]

Answer:

The 802.11ac wireless standard takes channel bonding to a higher level because it can support 20MHz, 40MHz, and 80MHz channels, with an optional use of 160MHz channels.

Explanation:

The 802.11ac is a standardized wireless protocol established and accepted by the institute of electrical and electronics engineers (IEEE). 802.11ac as a wireless local area network (WLAN) protocol, has multiple amplitude and bandwidth, thus making it to be the first standard wireless protocol to have the ability to operate on a Gigabit (Gb) network.

Generally, the 802.11ac wireless standard provides an advantage over 802.11n by incorporating increased channel bonding capabilities. The 802.11ac wireless standard takes channel bonding to a higher level because it can support 20MHz, 40MHz, and 80MHz channels, with an optional use of 160MHz channels.

<em>On the other hand, 802.11n is a standardized wireless protocol that can support either a 20MHz or 40MHz channel. </em>

6 0
3 years ago
The processing power of a computing device is measured by its _____.
Scilla [17]

Answer:

china

Explanation:

8 0
3 years ago
Which resource helps a user access a cloud service?
gregori [183]

Answer B (Data storage system)

5 0
3 years ago
Other questions:
  • What are three new things in Microsoft Word 2016?
    5·1 answer
  • Ergonomically designed workstations and equipment reduce stress-related injuries and improve the productivity and efficiency of
    13·2 answers
  • What are some benefits of 3-D printing?
    9·1 answer
  • You are the head of the corporate security department, and the Microsoft teamhas asked you for some assistance in setting the pa
    11·1 answer
  • Identify the type of error described
    6·1 answer
  • Is a biometric system an input, output, storage or soft device?​
    6·1 answer
  • Mobile computing is growing in importance each and every day, and the IT manager must take that into account. Do some web resear
    14·1 answer
  • In Python, parentheses are used in calculations where the order of operations affects the outcome. (5 points)
    9·1 answer
  • The owner of a candle shop has asked for your help. The shop sells three types of candles as shown below:
    14·1 answer
  • How does a fully integrated Data and Analytics Platform enable organizations to convert data into consumable information and ins
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!