1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotegsom [21]
2 years ago
7

An organization requires secure configuration baselines for all platforms and technologies that are used. If any system cannot c

onform to the secure baseline, the organization must process a risk acceptance and receive approval before the system is placed into production. It may have non-conforming systems in its lower environments (development and staging) without risk acceptance, but must receive risk approval before the system is placed in production. Weekly scan reports identify systems that do not conform to any secure baseline. The application team receives a report with the following results:
Host Environment Baseline deviation ID(criticality)
NYAccountingDev Development
NYAccountingStg Staging
NYAccounting Prod Production 2633 (low), 3124 (high)
There are currently no risk acceptances for baseline deviations. This is a mission-critical application, and the organization cannot operate if the application is not running. The application fully functions in the development and staging environments. Which of the following actions should the application team take?
A. Remediate 2633 and 3124 immediately.
B. Process a risk acceptance for 2633 and 3124.
C. Process a risk acceptance for 2633 and remediate 3124.
D. Shut down NYAccounting Prod and investigate the reason for the different scan results.
Computers and Technology
1 answer:
Romashka [77]2 years ago
8 0

Answer:

C. Process a risk acceptance for 2633 and remediate 3124.

Explanation:

There are various business risks. Some are inherited risks while other are risks are associated with nature of business. It is dependent on business owners that they want to accept risk or mitigate the risk. Risk acceptance is based on the strategy of the management. In the given scenario Accounting Prod Production has low risk 2633 which is accepted while 3124 is high risk which is remediated.

You might be interested in
Consider the following scenario below and recommend a solution.
sammy [17]

your account has enabled profile pictures for your users, you can manage all profile pictures for your account. Profile pictures are public and automatically approved when users upload an image in their settings. Using profile pictures can make it easier to see the users in your account and managing them gives you the ability to keep the pictures appropriate.

If Gravatars are enabled for an institution in account settings, and a user has a Gravatar but chooses not to upload a profile picture, the Gravatar will display for the user's profile picture.

If a student views another student's user details in a course and reports a profile picture as inappropriate, you can review those profile pictures and approve, lock, or delete the picture. In the courses, instructors can remove profile pictures completely from a user's details page.

5 0
2 years ago
Dyn is a cloud-based internet performance management company that provides DNS services for internet websites. It was attacked w
notsponge [240]

Answer: ......

Explanation: yes

8 0
2 years ago
Using complete sentences post a detailed response to the following.
KatRina [158]

Answer:A couple disadvantaged are the migraines that is can cause. And it can cause eye strain there are alot of things that could hurt your eyes. Like being in virtual reality for to long. It can very rarely make you go blind.

Explanation: sorry if its wrong

8 0
2 years ago
Four example of computer software?​
rodikova [14]

<em>answer</em><em>=</em><em> </em><em>safari</em><em>,</em><em> </em><em>ms</em><em>-</em><em>word</em><em>,</em><em> </em><em>moviemaker</em><em>,</em><em> </em><em>ms</em><em>-</em><em>pain</em><em>t</em><em>,</em><em> </em><em>firefox</em><em>,</em><em>etc</em><em>.</em><em>.</em><em>.</em>

5 0
3 years ago
A lot of computations involve processing a string one character at a time. Often they start
dedylja [7]

Answer:

The last character in the string processed is "t".

Explanation:

The index start from 0 and the len(fruit) is 5.

When index is 0 which is less than 5; "f" is printed

When index is 1 which is less than 5; "r" is printed

When index is 2 which is less than 5; "u" is printed

When index is 3 which is less than 5; "i" is printed

When index is 4 which is less than 5; "t" is printed

When index is 5, the condition is false; so the loop content is not executed.

Therefore, the last character traversed in the string "fruit" is "t".

3 0
3 years ago
Other questions:
  • Solar power plants trap the sun’s energy and convert it into electricity. What is a problem associated with this technology?
    11·1 answer
  • &gt;&gt;&gt; import math &gt;&gt;&gt; print(math.Pi) 3.141592653589793 &gt;&gt;&gt; def print_volume(): print ("What is the radi
    12·1 answer
  • What is looping in QBASIC​
    9·1 answer
  • After clicking the Start button on your computer screen desktop, what option would you then select to examine system components
    5·1 answer
  • Put these steps for managing your study time in chronological order. 1 set aside the same time each day 2 Identify the best time
    14·1 answer
  • Which of the following works on the pay-per-click (PPC) and cost-per-click (CPC) concept? ~ Plato
    9·1 answer
  • Electronic mail is best used to:
    5·2 answers
  • Tamara is writing a program to organize students in a class and needs to use operators to organize student grades, then compare
    9·1 answer
  • An agile team has which two characteristics? (choose two. ).
    10·1 answer
  • FOR A BRAINLIEST
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!