1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bulgar [2K]
3 years ago
10

For each of the threats and vulnerabilities from the Identifying Threats and Vulnerabilities in an IT Infrastructure lab in this

lab manual (list at least three and no more than five) that you have remediated, what must you assess as part of your overall COBIT P09 risk management approach for your IT infrastructure?
Computers and Technology
1 answer:
tia_tia [17]3 years ago
5 0

COBIT P09 is a management tool  or approach for your IT infrastructure  where THREATS  and VULNERABILITIES  affected IT infrastructure lab

<u>Explanation</u>

1. The first process should update antivirus each pc or workstation on laptop or  workstation

2. Update operating system updates if any pending for each pc or workstation or laptop

3. Each PC or desktop or workstation to be scanned and check any threats or Vulnerabilities

4. Once the scanning is completed check still Threats and Vulnerabilities  still exists physically check schedule task any new task created if so disable or delete it  

5. If Windows operating system kindly check user\appdata\local folder etc and delete unwanted folders

6. Repeats the process of step 5 till threats and Vulnerabilities is removed In each desktop or workstation  or laptop.

COBIT P09 is assets the risk process for any infrastructure lab, It is a strategic process that is applied with another process to get rid of Threats and Vulnerabilities.

You might be interested in
_____ separation strategies (e.g., attacking and sabotaging others) are used by those for whom co-cultural segregation is an imp
soldier1979 [14.2K]

Answer: Aggressive

Explanation:

Aggressive separation strategies are the technique that involves confrontation and intense feeling for separating something from others.

  • This technique includes action like attacking, assaultive, confronting etc.for segregation.
  • Co-culture segregation is separation of a subset of culture from large and major culture.In this culture, there can be more than two types of culture that are split forcefully through barrier.
  • Thus, co-culture segregation uses the methodology of aggressive separation.

5 0
3 years ago
We can harden a host by: a. Limiting physical access to it b. Turning off unnecessary services c. Installing patches d. All of t
Rina8888 [55]

Answer:

D

Explanation:

All three of A, B and C are required to harden a host. Thus, All of the above makes the best option.

Hardening simply refers to making your data impossible to be penetrated. More like bulletproof.

To do this, ensure measures like

- Regular Program cleanup

- Patches management

- service pack installation

- service or usage policies

...among others.

Cheers

3 0
2 years ago
Write at least 4 sentences
elixir [45]

Answer:

I don't know who advance the evolution who is it!

8 0
3 years ago
Which statement about dialogues is NOT correct? Select one: A. Users should be able to control the direction of speed of dialogu
Gennadij [26K]

Answer:

Option B is not correct

Explanation:

Dialogues become problematic when they appear automatically because of high level incompatibility

3 0
2 years ago
Why is a personal laptop computer NOT a server?
bixtya [17]
I believe the answer is C) <span>servers are used directly by computers, not by people

Have a good day! =)</span>
4 0
3 years ago
Read 2 more answers
Other questions:
  • When a crystal grows in unrestricted space, how does growth occur?
    14·2 answers
  • Which of the following would be considered a strong password?
    5·2 answers
  • Think of a game you are familiar with and identify at least three team responsibilities which were required to make the game, on
    5·1 answer
  • Which language is the most popular language for writing apple os x?
    9·1 answer
  • What is a series of instructions or commands that a computer follows used to create software
    9·1 answer
  • Assume that the array monthSales of integers has already been declared and that its elements contain sales data for the 12 month
    13·1 answer
  • GAMES Which is better Roblox or BattleCamp Basically Free Points But Please Answer
    7·2 answers
  • Beyond adding equations, what else does the Insert Equation feature allow users to do?
    7·1 answer
  • Hich of these statements is a value statement?
    14·2 answers
  • What is your favorite anime ( All movies and episodes related to them count )
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!