Answer:
C.
Explanation:
In the Incident Management Workflow , first you Authenticate the incident; Then log the incident. Then prioritize the problem; and then archive the incident.
Thus, 1 - 3 - 4 - 2
Cheers
Answer: True
Explanation: For the creation of the security services and function the first step is having a policy regarding the security measure that is to be taken.Security policy consist of the procedures and function that should be implement in the system as a plan.
It monitors the flow,accessing of external component ,data assessment etc fro the protection.After the policies are made then the implementation take place. The most common deployment of this policy is in information technology(IT)sector .Thus, the given statement is true..
Answer:
A mouse.
Explanation:
An input device can be defined as any device that is typically used for sending data to a computer system.
Generally, all of the output and input device of a computer are known as peripheral (external) devices and they provide data (informations) to the end users in various formats such as video, audio, texts, images etc.
Since input devices are peripheral (external) devices, they can be connected to the computer system wirelessly or through a wired-connection (cable).
Some examples of peripheral (external) devices are monitor, speakers, keyboard, printer, scanner, projector, mouse, etc.
A mouse is an input device that is designed and used to select specific menu options, drag and drop options and to draw something on screen.
Answer:
Why is social media important? Social media is important because it allows you to reach, nurture, and engage with your target audience — no matter their location. When a business can use social media to connect with its audience, it can use social media to generate brand awareness, leads, sales, and revenue.