1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bulgar [2K]
3 years ago
10

For each of the threats and vulnerabilities from the Identifying Threats and Vulnerabilities in an IT Infrastructure lab in this

lab manual (list at least three and no more than five) that you have remediated, what must you assess as part of your overall COBIT P09 risk management approach for your IT infrastructure?
Computers and Technology
1 answer:
tia_tia [17]3 years ago
5 0

COBIT P09 is a management tool  or approach for your IT infrastructure  where THREATS  and VULNERABILITIES  affected IT infrastructure lab

<u>Explanation</u>

1. The first process should update antivirus each pc or workstation on laptop or  workstation

2. Update operating system updates if any pending for each pc or workstation or laptop

3. Each PC or desktop or workstation to be scanned and check any threats or Vulnerabilities

4. Once the scanning is completed check still Threats and Vulnerabilities  still exists physically check schedule task any new task created if so disable or delete it  

5. If Windows operating system kindly check user\appdata\local folder etc and delete unwanted folders

6. Repeats the process of step 5 till threats and Vulnerabilities is removed In each desktop or workstation  or laptop.

COBIT P09 is assets the risk process for any infrastructure lab, It is a strategic process that is applied with another process to get rid of Threats and Vulnerabilities.

You might be interested in
Which of the following is not one of the steps a company would take in an attempt to prevent a malfunction or failure of their p
bulgar [2K]

Answer:

A overdesign

Explanation:

7 0
3 years ago
What does clicking and dragging the fill handle in excel
Olegator [25]

Answer:

The fill handle copies the same values, formulas, or fills a series of dates, texts, numbers, and other data to a desired number of cells. ... Click and hold the handle, then you can drag up, down, across over other cells. When you release your mouse button, it auto-fills the content to the cells you dragged over.

5 0
2 years ago
Define and implement a method that takes a string array as a parameter and returns the length of the shortest and the longest st
Drupady [299]

Answer:

#HERE IS CODE IN PYTHON

#function to find length of shortest and longest string in the array

def fun(list2):

   #find length of shortest string

   mn=len(min(list2))

   #find length of longest string

   mx=len(max(list2))

   #return both the value

   return mn,mx

#array of strings

list2 = ['Ford', 'Volvo', 'BMW', 'MARUTI','TATA']

# call the function

mn,mx=fun(list2)

#print the result

print("shortest length is:",mn)

print("longest length is:",mx)

Explanation:

Create an array of strings.Call the function fun() with array as parameter. Here min() function will find the minimum string among all the strings of array and then len() function will find its length and assign to "mn". Similarly max() will find the largest string and then len() will find its length and assign to "mx". Function fun() will return "mn" & "mx".Then print the length of shortest and longest string.

Output:

shortest length is: 3

longest length is: 5

7 0
3 years ago
Which data type is used to teach a Machine Learning (ML) algorithm during structured learning?
vodka [1.7K]

Which data type is used to teach a Machine Learning (ML) algorithm during structured learning?

answer:

5 0
2 years ago
What happens to the Menu Bar when the<br> object (image, shape, etc.) is "active"?
nexus9112 [7]

Answer: Ok so Sorry about this but I will answer thing at 10:20 tommorow I promise

Explanation:

5 0
2 years ago
Other questions:
  • . Alex discovered a bunch of SATA drives in a box at the office and needs to check the contents. What can he do so that Windows
    13·1 answer
  • HELP PLEASE NOW ASAP BRAINLIEST
    13·2 answers
  • A law office has been leasing dark fiber from a local telecommunications company to connect a remote office to company headquart
    14·1 answer
  • If you will be giving your presentation to an audience, you can practice your presentation by using View, ___________, to rehear
    14·1 answer
  • Write a program that takes in an integer in the range 20-98 as input. The output is a countdown starting from the integer, and s
    12·1 answer
  • Divide 111001 by 1101​
    7·1 answer
  • Complete the sentence.
    8·1 answer
  • Which of the following is the file type of Microsoft® Publisher files?
    12·2 answers
  • A start-up is expanding overseas and spends an excessive amount of time on recruiting and hiring activities, hindering its abili
    12·1 answer
  • Only the root user can modify a file that has the immutable attribute set.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!