1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bulgar [2K]
3 years ago
10

For each of the threats and vulnerabilities from the Identifying Threats and Vulnerabilities in an IT Infrastructure lab in this

lab manual (list at least three and no more than five) that you have remediated, what must you assess as part of your overall COBIT P09 risk management approach for your IT infrastructure?
Computers and Technology
1 answer:
tia_tia [17]3 years ago
5 0

COBIT P09 is a management tool  or approach for your IT infrastructure  where THREATS  and VULNERABILITIES  affected IT infrastructure lab

<u>Explanation</u>

1. The first process should update antivirus each pc or workstation on laptop or  workstation

2. Update operating system updates if any pending for each pc or workstation or laptop

3. Each PC or desktop or workstation to be scanned and check any threats or Vulnerabilities

4. Once the scanning is completed check still Threats and Vulnerabilities  still exists physically check schedule task any new task created if so disable or delete it  

5. If Windows operating system kindly check user\appdata\local folder etc and delete unwanted folders

6. Repeats the process of step 5 till threats and Vulnerabilities is removed In each desktop or workstation  or laptop.

COBIT P09 is assets the risk process for any infrastructure lab, It is a strategic process that is applied with another process to get rid of Threats and Vulnerabilities.

You might be interested in
Substance abuse is an _____ coping mechanism.
hichkok12 [17]
Mental coping mechanism.
7 0
2 years ago
To navigate to a new web page for which you know the url, type that url in the browser’s ____ bar and press enter.
Slav-nsk [51]
It would be to type the url in the browser's address bar
3 0
3 years ago
Which of these inventions was necessary to permit magnetic recording?
eimsori [14]
It’s C vinyl records permit magnetic fields
4 0
3 years ago
Read 2 more answers
Help please what is the answer , thanks!!!
shepuryov [24]

Answer:

X = "Hello World"

Y = "hello world"

Z = 100

C = 200

if X == Y:

   print("TRUE")

else:

   print("FALSE")

if Z > C:

   print("TRUE")

else:

   print("FALSE")

4 0
2 years ago
You need to find out more about the fdisk utility and the commands associated with it before you set up a new Linux system in ad
Ivenika [448]

Answer:

Option A i.e., man fdisk.

Explanation:

If the user wants to finds more regarding the fdisk utility as well as the related instructions until setting up a new Linux system besides those that are currently utilizing. So, the following man fdisk command could be used to finds more regarding fdisk on his current system.

Other commands are not useful for according to the following scenario because they are used in Linux for other purposes.

5 0
3 years ago
Other questions:
  • What should you use as the argument for the goto() command?
    6·1 answer
  • What information is required for a complete citation of a website source?
    8·2 answers
  • If parties in a contract are not ____, the contract can be canceled.
    12·1 answer
  • Having a good credit score is important because:
    7·1 answer
  • The
    6·2 answers
  • A mobile device you are troubleshooting is experiencing a sharp decrease in performance after an hour of operation. The user pow
    12·1 answer
  • Which of the following can spreadsheet programs help a person with? (choose all that apply.)
    9·1 answer
  • If the user enters any operator symbol other than , -, *, or /, then an UnknownOperatorException is thrown and the user is allow
    8·1 answer
  • Examples of application software​
    7·2 answers
  • The memory used by the CPU to temporarily hold data while processing is called _______. random access memory central processing
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!