1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bulgar [2K]
3 years ago
10

For each of the threats and vulnerabilities from the Identifying Threats and Vulnerabilities in an IT Infrastructure lab in this

lab manual (list at least three and no more than five) that you have remediated, what must you assess as part of your overall COBIT P09 risk management approach for your IT infrastructure?
Computers and Technology
1 answer:
tia_tia [17]3 years ago
5 0

COBIT P09 is a management tool  or approach for your IT infrastructure  where THREATS  and VULNERABILITIES  affected IT infrastructure lab

<u>Explanation</u>

1. The first process should update antivirus each pc or workstation on laptop or  workstation

2. Update operating system updates if any pending for each pc or workstation or laptop

3. Each PC or desktop or workstation to be scanned and check any threats or Vulnerabilities

4. Once the scanning is completed check still Threats and Vulnerabilities  still exists physically check schedule task any new task created if so disable or delete it  

5. If Windows operating system kindly check user\appdata\local folder etc and delete unwanted folders

6. Repeats the process of step 5 till threats and Vulnerabilities is removed In each desktop or workstation  or laptop.

COBIT P09 is assets the risk process for any infrastructure lab, It is a strategic process that is applied with another process to get rid of Threats and Vulnerabilities.

You might be interested in
How has A.I. evolved and helped humanity in recent times?
Ksenya-84 [330]

Answer:

AI has helped many people in these days.

Explanation:

With AI adoption on the rise, the technology is addressing a number of global challenges.

Artificial intelligence is being used to help crack down on illegal activities.

It is helping to tackle over fishing in our ocean.

And it is even being used to address the issue of gender imbalance.

6 0
2 years ago
Kyle is running out of disk space on his hard drive on a Windows XP Professional system. He has installed and configured a third
Varvara68 [4.7K]

Answer:

The answer is "Disk utility".

Explanation:

It'll work well go over to Disk utility before updating the drivers like diskmgmt.msc throughout the Running box, or right-click Device icon, and pick Manage. Click Rescan Disks on the key decision-makers. It's not essential to reconnect until the machine recognizes the latest disc.

  • In each disc setup as storage properties is a reactive drive. Almost every dynamic disk is separated into quantities.
  • It is the season, spanned, and strip volume forms will be included.
5 0
3 years ago
Read 2 more answers
The software that requests mail delivery from the mail server to an Internet device is known as mail ____ software.
OleMash [197]

The software that requests mail delivery from the mail server to an Internet device is known as mail client software.

Explanation:

Mail client software is a form of communication in which electronic messages are created and transferred between two or multiple devices connected to a network series or stream.

8 0
3 years ago
At the second simple query wizard dialog box, you are asked whether you would like to create a detail or a(n) _____ query.
Alisiya [41]
The correct answer is: Summary

<span>If you only selected fields from a single table in the first screen, then when you click the “Next >” button to continue, you will only need to provide the query with a name and then click the “Finish” button to finish creating the query. If, however, you picked data fields from two or more related tables, then when you click the “Next >” button, you will instead view a second screen which asks if you would like a “Detail” or “Summary” query. You can select the option button for the type of query that you wish to create. If you select “Summary,” then you will be able to click the “Summary Options…” button to open the “Summary Options” dialog box. In this dialog box, you can select what type of summary to perform over a selected field. Make your selections, and then click the “OK” button to return to the “Simple Query Wizard.”</span>

Select summary to show only results of aggregate functions.

Select the aggregate function and the field name of the numeric field in the list box. You can enter as many aggregate functions as you want, one in each row of controls.

Aggregate function

Select the aggregate function.

Field name

Select the numeric field name.

+

Appends a new row of controls.

-

Removes the last row of controls.

3 0
3 years ago
What is the process of ensuring that corporate security policies are carried out<br> consistently?
tester [92]
Policy or security and only conscious
3 0
2 years ago
Other questions:
  • What is a block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits?
    8·1 answer
  • What is the recommended size for bulleted text?
    5·2 answers
  • ___________ is produced by propulsion systems or engines.
    6·1 answer
  • The jailbreak property that, if the user turns the device off and back on, the device will start up completely, and the kernel w
    15·1 answer
  • ____ documents consist of the text to be displayed on a Web page, together with a number of special characters: tags that achiev
    14·1 answer
  • What is the practical application of the information acquired by science.
    15·1 answer
  • Procedural programs specify instructions that a processor must execute to perform computations. These programs sometimes consist
    11·1 answer
  • Were is the hype house
    5·2 answers
  • What does clicking and dragging the fill handle in excel
    7·1 answer
  • The quickest way to change a word is to double
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!