1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alekssr [168]
3 years ago
7

Match each item with a statement below. 1. Defines roles and responsibilities for information security 2. Too risky for most bus

inesses 3. A single trainer works with multiple trainees in a formal setting 4. Trainees receive a seminar presentation at their computers 5. Usually activated when an incident causes minimal damage with little or no disruption to business operations 6. A source of information for developing IR policy 7. A review of an unusual pattern of entries in a system log 8. An online resource for IR 9. Can serve as a training case for future staff
Business
2 answers:
Molodets [167]3 years ago
5 0

Answer:

Match each item with a statement below.

1. Defines roles and responsibilities for information security = IR Policy

2. Too risky for most businesses = Full Interruption testing

3. A single trainer works with multiple trainees in a formal setting = Formal class learning

4. Trainees receive a seminar presentation at their computers = Distance Learning

5. Usually activated when an incident causes minimal damage with little or no disruption to business operations = IR plan

6. A source of information for developing IR policy = Organizational charts

7. A review of an unusual pattern of entries in a system log = Trigger

8. An online resource for IR = CERT Coordination Center

9. Can serve as a training case for future staff = After action review

Explanation:

1. IR policy is defined as Incident response policy. It is a policy that tells us the functions that the Information Security carries out in a particular business or enterprise.

2. Full Interruption testing is a process or procedure that helps to coordinates the disaster recovery plan for most businesses. It is quite risky for most businesses.

3. Formal class learning : Formal learning is a process where by Students have to attend classes physically and they are taught by a Teacher or a Trainer.

4. Distance Learning: This is a means or form or learning where students don't need to attend classes physically at a school or college. Lecture, Seminars , Exams can be assessed y the students online through their computers.

5. IR Plan : This is the plan that is put in place and it is implemented when a situation occurs at this businesses that results in minimal damage

6. Organization charts : They consist necessary information or data that can be used to develop or create an IR policy.

7. Trigger: This is activated when after checking the logs found in a system, an unusual pattern of entries is observed or noticed.

8. CERT Coordination Center: This is a coordination center where we can information or get adequate knowledge on IR.

9. After Action review: It is used to a means or way for a group of people working on a particular project to learn from their mistakes. It also helps them to be able to improve on any future tasks they will be taking on together. It can be used as a training case for future staff.

ValentinkaMS [17]3 years ago
3 0

Answer:

1 and 6,  3 and 4, 8 and 9, 2 and 7

Explanation:

1 and 6: For developing IR policy, roles and responsibilities for informatino security must be clearly defined

3 and 4: a single trainer working with multiple trainees is trainees receiving presentation

8 and 9: An online resource for IR can serve as a training case for staff

2 and 7: an unsual pattern in a system log can be risky for the business

You might be interested in
Suppose Saron has 7 Birr to be spent on two goods: banana and bread. The unit price of banana is 1 Birr and the unit price of a
mojhsa [17]

Answer:

Solution:

A.

p_x=3, G_x=\frac {100}{3}=33\frac{1}{3}p

x

=3,G

x

=

3

100

=33

3

1

p_y=5, G_y=\frac{100}{5}=20p

y

=5,G

y

=

5

100

=20

B.

100-0.25\times 100=75100−0.25×100=75

p_x=3, G_x=\frac {75}{3}=25p

x

=3,G

x

=

3

75

=25

p_y=5, G_y=\frac{75}{5}=15p

y

=5,G

y

=

5

75

=15

C.

p_x=6, G_x=\frac {100}{6}=16\frac{2}{3}p

x

=6,G

x

=

6

100

=16

3

2

D.

p_y=5, G_y=\frac{100}{4}=25p

y

=5,G

y

=

4

100

=25

2.

MU_x=68-60=8, p_x=2MU

x

=68−60=8,p

x

=2

MU_y=29-25=4, p_y-?MU

y

=29−25=4,p

y

−?

\frac {MU_x}{p_x}=\frac{MU_y}{p_y}

p

x

MU

x

=

p

y

MU

y

\frac{8}{2}=\frac {4}{p_y}

2

8

=

p

y

4

p_y=1p

y

=1

8 0
3 years ago
Alana lives in a country in which the government does not impose quotas on what can be imported or on what businesses can produc
Elis [28]

Answer:

Free-market

Explanation:

As Alana can import without paying quotas to the government the economy i nthis country is of free-market. The government doesn't try to restrict their citizens from the goods and services offered fro manother countries.

Same is true for the sale of national product to abroa,there is no qupta, tariff or additional cost involved in trade thant those generated from the transactions. It is tax-free to import and export

5 0
4 years ago
The marketing staff wants to supply pens with attached USB drives to clients. In the past this client has been victimized by soc
Firdavs [7]

Answer: C. The security risks associated with combining USB drives and cell phones on a network

D. The risks associated with the large capacity of USB drives and their concealable nature

Explanation:

Based on the scenario that has been discussed in the question, the security administrator will instructs the marketing staff not to supply the USB pens based on the security risks that are associated with combining USB drives and cell phones on a network.

Another reason is due to the risks that are associated with the large capacity of USB drives and their concealable nature.

Since the client has been victimized by social engineering attacks that led to a loss of sensitive data in the past, they'll be extra careful this time around.

4 0
3 years ago
Companies can effectively market to teens by:
serious [3.7K]
<span>Teenagers and young adults are more likely to view social networks as a valuable source of information. additionally, making products modern and convenient makes marketing to teens much more effective.</span>
6 0
3 years ago
When reconciling a bank account, which one of the following is considered a timing difference (difference between the bank balan
DanielleElmas [232]

Answer:

Outstanding checks

Explanation:

One of the reasons why a cash book and a bank statement might <em>not show identical entries arise</em> from outstanding checks.

Outstanding checks are payments that have not yet been cleared and debited to the account at the bank.

8 0
3 years ago
Other questions:
  • Which of the following methods is a mathematical technique used for finding the best location for a single distribution point th
    12·1 answer
  • According to the _____, the most effective management theory or idea depends on the kinds of problems or situations that manager
    5·1 answer
  • November 12 - Declared a total cash dividend of $45,000 for stockholders of record November 20 payable on December 1. Record the
    6·1 answer
  • n January​ 1, 2018, Waller Sales issued $ 20 comma 000 in bonds for $ 18 comma 300. These are eightminusyear bonds with a stated
    14·1 answer
  • Assume you have $2,000 in a savings account at the beginning of the year and the price level is equal to 100. If the price level
    7·1 answer
  • An agent gives a conditional receipt to a client for an insurance policy after collecting the initial premium. when will the pol
    7·1 answer
  • Which type of economy best represents individual preferences and a lack of government interference?
    10·1 answer
  • Your firm uses half debt and half equity. The shareholders need to earn 20%. The firm can borrow at 5%. The risk free rate is 2%
    10·1 answer
  • A customer slipped and fell in a store and was severly injured. As required by state regulation, the store's manager conducted a
    15·1 answer
  • It takes $1200$ workers $8$ years to build $3$ ziggurats. How many years would it take $100$ workers to build $1$ ziggurat
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!