1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RoseWind [281]
4 years ago
13

The U.S. National Institute of Standards and Technology defines the incident response life cycle as having four main processes:

1) Preparation 2) Detection and analysis 3) Containment, eradication, and recovery; and 4) ____. Select one: a. incident report b. triage c. post-incident activity d. resolution
Computers and Technology
1 answer:
GuDViN [60]4 years ago
7 0

Answer:

C. Post-incident activity.

Explanation:

An incident is a event of intrusion or attack or violation of an attempt of an attack. An incident response is an opposing response to an attack or violation.

An incident response life cycle are stages followed to mitigate a current attack or violation. The stages of the incident response life cycle are, preparation, detection and analysis, containing and eradicating and recovery, and post incident activity.

You might be interested in
Protected base class members cannot be accessed by: a.friends of the base class.
tatyana61 [14]

Answer:

The answer is "Option d".

Explanation:

This class members can be accessed by their member and the friend of there class, It is also known as the Members of the derived class from the basic class can be accessed by the protected and non-static member of the base class, and wrong choices can be described as follows:

  • Option a and Option b both are wrong because non-static member can't be accessed by there base or derived class.
  • In option c, It is wrong because the function is a member function of the derived class.
7 0
3 years ago
In a void function, the return statement is not necessarily. True or false? ​
Assoli18 [71]

Answer:

true

Explanation:

8 0
3 years ago
Read 2 more answers
5255555555555+55555555555555/1111*99442
Marina CMI [18]

Answer:

(502763134343429265 /101)

Explanation:

7 0
4 years ago
Read 2 more answers
A database record can best be described as:
ratelena [41]

Answer:

The answer to this question is given below in the explanation section

Explanation:

The correct option to this question is D.

A database record can be best described as the collection of information consisting of one or more related fields about a specific entity. Because a database record represents a record about a specific entity for example a student record studying in a school. A student is a specific entity in the database and it has one or more related fields, for example, name, class, courses in which enrolled etc.

others options are not correct because:

A: a database record is a collection of data about a specific entity and it is not about a limited topic.

B: all database records can be sorted and searched using search algorithms but it is not necessarily because you can search data sometimes using quarries etc.

C: a database record is not a category of information in a table but it is a collection of one or more related field about a specific entity.

5 0
4 years ago
Many websites (mostly online shopping sites), monitor a person’s Internet browsing behavior, such as the websites we often visit
mamaluj [8]

Answer:

Yes, this pratice is ethical

Explanation:

You are freely choosing to go on to these websites and most websites inform you that they are doing this. Edward Snowden, told the world that goverments are spying on them. Most people did not have a problem with this. Since, most people have a way to inform themsevles about the practices on the websites(by reading the terms of serve) and people don't care about spying than this is in no way unethical practice.

7 0
3 years ago
Other questions:
  • When using a graphics editing program, which option allows you to adjust the space around an image?
    15·1 answer
  • The ____ of an identifier refers to where in the program an identifier is accessible (visible).
    10·1 answer
  • Juan is interested in getting a job in the technological field. He is interested in protecting data from threats, and stopping h
    9·1 answer
  • Name the months that have 30 days​
    6·2 answers
  • What are the correct steps to find the system specifications such as the amount of RAM or system type?
    13·1 answer
  • ​ In the U.S., a work that was created in 2000 by an individual author who died in 2005 will be protected by copyright until ___
    5·2 answers
  • Will mark brain list
    5·2 answers
  • Assume myString and yourString are variables of type String already declared and initialized. Write ONE line of code that sets y
    15·1 answer
  • web analytics can tell you many things about your online performance, but what can analytics tools not tell you​
    8·1 answer
  • What does playstation network is currently undergoing maintenance?.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!