1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotegsom [21]
3 years ago
7

An organization requires secure configuration baselines for all platforms and technologies that are used. If any system cannot c

onform to the secure baseline, the organization must process a risk acceptance and receive approval before the system is placed into production. It may have non-conforming systems in its lower environments (development and staging) without risk acceptance, but must receive risk approval before the system is placed in production. Weekly scan reports identify systems that do not conform to any secure baseline. The application team receives a report with the following results:
Host Environment Baseline deviation ID(criticality)
NYAccountingDev Development
NYAccountingStg Staging
NYAccounting Prod Production 2633 (low), 3124 (high)
There are currently no risk acceptances for baseline deviations. This is a mission-critical application, and the organization cannot operate if the application is not running. The application fully functions in the development and staging environments. Which of the following actions should the application team take?
A. Remediate 2633 and 3124 immediately.
B. Process a risk acceptance for 2633 and 3124.
C. Process a risk acceptance for 2633 and remediate 3124.
D. Shut down NYAccounting Prod and investigate the reason for the different scan results.
Computers and Technology
1 answer:
Romashka [77]3 years ago
8 0

Answer:

C. Process a risk acceptance for 2633 and remediate 3124.

Explanation:

There are various business risks. Some are inherited risks while other are risks are associated with nature of business. It is dependent on business owners that they want to accept risk or mitigate the risk. Risk acceptance is based on the strategy of the management. In the given scenario Accounting Prod Production has low risk 2633 which is accepted while 3124 is high risk which is remediated.

You might be interested in
Please help. 10 points
pickupchik [31]

Answer:

God Is Good He Will Always Help You He Is Good And Always Good!!

If God Is For Us Who Can Be Against us?? Romans 8:31

Explanation:

6 0
2 years ago
Read 2 more answers
Function Integer cube(Integer num) Return num * num * num End Function Write a main module that contains a statement that passes
Klio2033 [76]

Answer:

#include <iostream>

using namespace std;

int cube(int num)//function cube..

{

   return num*num*num;

}

int main() {

   int result=cube(4);//result stores the value of cube(4).

   cout<<result;//displaying it to the screen.

return 0;

}

Explanation:

The above code is in C++ language.The function cube is passed with value 4 and the result of it is stored in the variable result of integer type.Then the result is displayed using the cout. Which is used to print the statement to the output screen.

5 0
3 years ago
A network engineer executes the following command sequence (-i specifies the TTL of the ICMP packet sent):
harkovskaia [24]

The correct option is D. tracert; This sequence emulates is utilities for the command sequence.

<h3>Explain the term command sequence?</h3>

We can complete operations that need numerous phases thanks to sequence, which refers to the order in which commands are processed by a computer.

  • Sequence is indeed a basic algorithm in programming: a series of sequentially carried out logical steps.
  • Network engineers create and implement network setups, address performance issues, monitor networks, and set up firewalls and other security measures.
  • By delivering Internet Control Message Protocol (ICMP) is  echo packet to a target, the TRACERT diagnostic tool ascertains the path to the location.

Thus,  utilities is emulated by this sequence is TRACERT .

To know more about the command sequence, here

brainly.com/question/27703743

#SPJ4

3 0
1 year ago
In Bash, what commands can you use to view the contents of a document?
AlekseyPX

You can use the cat and less command to view the contents of a file.

hope this helps! :)

8 0
2 years ago
In computing, what does LAN stand for?​
Arlecino [84]

Answer:

LAN stands for Local Area Network

4 0
2 years ago
Read 2 more answers
Other questions:
  • A _____ is a device that not only provides surge protection, but also furnishes desktop computers and network devices with batte
    7·1 answer
  • How do online note-taking tools support students’ academic goals? Check all that apply.
    9·2 answers
  • Vitamins and minerals dissolve easily in water.True or false?
    5·1 answer
  • You have compiled a new kernel using rpm. when you reboot, the new kernel is not the default selection on the boot menu. you use
    10·1 answer
  • Choose the types of education an ISS professional
    11·1 answer
  • The default for automatic replies in outlook is what?
    6·2 answers
  • To move an object to the bottom of the stack, click the Send Backwards arrow and then click Send to Back in the Arrange group on
    7·1 answer
  • The retention of encoded information over time refers to
    14·1 answer
  • When and why would you use a prefab? <br> Subject video gaming
    8·1 answer
  • Explain the unique reason why assember language is perfered to high level language
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!