1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotegsom [21]
3 years ago
7

An organization requires secure configuration baselines for all platforms and technologies that are used. If any system cannot c

onform to the secure baseline, the organization must process a risk acceptance and receive approval before the system is placed into production. It may have non-conforming systems in its lower environments (development and staging) without risk acceptance, but must receive risk approval before the system is placed in production. Weekly scan reports identify systems that do not conform to any secure baseline. The application team receives a report with the following results:
Host Environment Baseline deviation ID(criticality)
NYAccountingDev Development
NYAccountingStg Staging
NYAccounting Prod Production 2633 (low), 3124 (high)
There are currently no risk acceptances for baseline deviations. This is a mission-critical application, and the organization cannot operate if the application is not running. The application fully functions in the development and staging environments. Which of the following actions should the application team take?
A. Remediate 2633 and 3124 immediately.
B. Process a risk acceptance for 2633 and 3124.
C. Process a risk acceptance for 2633 and remediate 3124.
D. Shut down NYAccounting Prod and investigate the reason for the different scan results.
Computers and Technology
1 answer:
Romashka [77]3 years ago
8 0

Answer:

C. Process a risk acceptance for 2633 and remediate 3124.

Explanation:

There are various business risks. Some are inherited risks while other are risks are associated with nature of business. It is dependent on business owners that they want to accept risk or mitigate the risk. Risk acceptance is based on the strategy of the management. In the given scenario Accounting Prod Production has low risk 2633 which is accepted while 3124 is high risk which is remediated.

You might be interested in
Computers in a medical office should be protected by which of the following security tools?
Verizon [17]
<span> it is necessary to maintain your computer on a regular basis. .... Remember these key points when recommending the Internet to a patient

Hope it helps.
</span>
8 0
4 years ago
Read 2 more answers
How can you access the Help and Support system?
Ne4ueva [31]
By going to the person on the bottom and there should be a tab
5 0
3 years ago
Read 2 more answers
Which industry did the Interstate Commerce Act primarily affect? A. coal B. airplane C. steel D. oil E. railroad
babunello [35]

I believe the answer is E. Railroad, hope this helps!

6 0
4 years ago
Read 2 more answers
Write an application that prompts a user for two integers and displays every integer between them. Display There are no integers
olga2289 [7]

Answer:

x = int(input("Enter an integer: "))

y = int(input("Enter another integer: "))

if x > y:

   for number in range(y+1, x):

       print(number, end=" ")

elif y > x:

   for number in range(x+1, y):

       print(number, end=" ")

else:

   print("There are no integers between {} and {}".format(x, y))

Explanation:

*The code is in Python.

Ask the user to enter the two integers, x and y

Since we want our program to run regardless of which entered value is larger, we need to compare the numbers to be able to create the loop that prints the numbers.

Check if x is greater than y. If it is, create a for loop that iterates from y+1 to x-1 and print the numbers

Otherwise, check if y is greater than x. If it is, create a for loop that iterates from x+1 to y-1 and print the numbers

If none of the previous part is executed, print that there are no integers between

4 0
3 years ago
__________ consists of both physical devices and software, links the various pieces of hardware, and transfers data from one phy
sineoko [7]

Answer:

Communications technology

Explanation:

<u>Communications technology</u> consists of both physical devices and software, links the various pieces of hardware, and transfers data from one physical location to another.

6 0
3 years ago
Other questions:
  • _____ documentation is designed to help programmers and systems analysts understand the application software and maintain it aft
    12·1 answer
  • Using physical proximity to gain login information, passwords, or other personal information is known as a(n) ____.
    7·1 answer
  • To create an effective study schedule, a student must guess the amount of time needed for studying. write down all activities an
    11·2 answers
  • The company that you work for has recently had a security breech. During the recover and assessment, it was discovered that the
    5·1 answer
  • What problems have arisen regarding use of the Internet for global business transactions, and how are they being resolved?
    15·1 answer
  • Which type(s) of license(s) allow the underlying software code to be viewed?
    15·1 answer
  • A peripheral can be used to tell a computer to complete a specific task.<br> A) True <br> B)False
    13·1 answer
  • To cope with the uncertainty about how their pages will be viewed, many web page designers opt to use _________ units, which are
    13·1 answer
  • When a called function completes its task, it normally:_________a. logs its results b. terminates program execution normally c.
    5·2 answers
  • Read the steps in the process of making a video.
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!