1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Liono4ka [1.6K]
3 years ago
5

Which of the following functions needed to implement the information security program evaluates patches used to close software v

ulnerabilities and acceptance testing of new systems to assure compliance with policy and effectiveness?
a. Systems testing
b. Risk assessment
c. Incident response
d. Systems security administration
Computers and Technology
1 answer:
solong [7]3 years ago
6 0

Answer:

a. Systems testing

Explanation:

According to my research on information technology, I can say that based on the information provided within the question the term being defined is called System Testing. Like mentioned in the question, this is a technique used in order to evaluate the complete system the system's compliance against specified requirements, which tests its functionalities from an end-to-end perspective in order to evaluates patches used to close software vulnerabilities and make sure it complies with all policies.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

You might be interested in
When is it most appropriate to quote from an e-mail message in a response?
allochka39001 [22]
I would say *d. when the quote is a part of a series of e-mails written by more than one person.*

eskettit hope this helped.
4 0
3 years ago
Read 2 more answers
What short (two letters!) but powerful boolean operator can check whether or not one string can be found in another string?
True [87]

Answer:

OR

Explanation:

"OR" expands a search by telling the database that any of the words it connects are acceptable. This is particularly beneficial when you are searching for synonyms, such as “the victorian age” OR “sexual puritanism”  

So, if you type in “the victorian age” OR “sexual puritanism”, your results will include articles with either term, but not necessarily both.

4 0
3 years ago
What code would you use to create the login button?
Simora [160]

Go To This Web Page

https://www.w3schools.com/howto/howto_css_login_form.asp

5 0
3 years ago
A search engine company needs to do a significant amount of computation every time it recompiles its index. For this task, the c
romanna [79]

Answer:

See attached pictures for detailed answer.

Explanation:

See attached pictures for explanation.

5 0
3 years ago
Python exercise grade 10
Lemur [1.5K]

nums = []

while True:

   num = float(input("Enter a number: "))

   if num <= 0:

       break

   nums.append(num)

print("The largest number entered was",max(nums))

I wrote my code in python 3.8. I hope this helps.

5 0
3 years ago
Other questions:
  • How do networks help protect data? -by preventing access by more than one person at a time -by restricting access to department
    11·2 answers
  • Welcome to Cypres...
    6·1 answer
  • What are the examples of personal computers ?
    8·1 answer
  • Drugs of addiction act upon a portion of the Brain called the lambic system ? True or false.
    7·1 answer
  • Suppose you have a primary location in New York City where you main corporate servers are located. Just in case something happen
    5·1 answer
  • in your own experience,imagine if someone gained access to any of your social media accounts they could changed your account nam
    11·1 answer
  • Write a programmer defined function that compares the ASCII sum of two strings. To compute the ASCII sum, you need to compute th
    6·1 answer
  • Large computer programs, such as operating systems, achieve zero defects prior to release. Group of answer choices True False Pr
    7·1 answer
  • Suppose the size of process is 10000 bytes and the relocation register is loaded with value 5000 which of the following memory a
    15·1 answer
  • What is one way to establish a team's velocity?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!