1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cricket20 [7]
3 years ago
7

Which element of the IT security policy framework provides detailed written definitions for hardware and software and how they a

re to be used?
Computers and Technology
1 answer:
Mashcka [7]3 years ago
5 0

Answer:

Standard

Explanation:

IT security policy framework is the documented agreement and policies, as well as procedures of how information is to be transmitted, how to mitigate system and network vulnerabilities in a business.

There are various elements of the IT security framework. An example of this element is the standard adopted. It is a document that gives the details of the hardware and software components used and how they are implemented in the network. Example of this standard is the ISO (international standards organisation).

You might be interested in
Los elementos de la comunicación técnica son el medio, el código y el contenido, ¿Esta información es falsa o verdadera?
LenaWriter [7]

la respuesta es verdadera

Explanation:

V

7 0
3 years ago
2) The CPU is made from a silicon<br>b) Chip<br>C) pendrive<br>a) Steel<br>​
Aleks [24]

Answer:

b

Explanation:

a cpu is made from silicon chip

5 0
3 years ago
Visme,PowerPoint, keynote and prezi are what kind of software
DerKrebs [107]

Answer:

Presentation Software

3 0
3 years ago
Explain different types of port?​
lukranit [14]

Answer:

.serial port

.VGA port

.Modem port

explain A port is a channel through which a device communicate with the operating system.

4 0
2 years ago
"what type of database allows new tables to be created out of information that is requested in a search of the database
Talja [164]
If you don't put propper measures into place while creating this database your site will vulnrable to SQL Injections. In this age most sites aren't because people have learned from past mistakes. My advice do some pentesting when you finish the site and if is vulnrable to SQL Injections quit web devlopment!
3 0
4 years ago
Read 2 more answers
Other questions:
  • why do programs include keyboard shortcuts for certain actions? do you prefer the mouse or the keyboard/ why?
    7·1 answer
  • What type of device can be used to block unwanted traffic initiated from the internet and can also restrict internet access from
    6·1 answer
  • Yes, because it allows many users to get together and work to help project their services.
    14·1 answer
  • What is data security
    14·1 answer
  • To check spelling errors in a document, the Word application uses the _____ to determine appropriate spelling. Internet built-in
    5·2 answers
  • Suppose that we pick the following three tuples from a legal instance of a relation S (S has 100 tuples in total). Relation S ha
    9·1 answer
  • Which tectonic plate setting is associated with the following features: great earthquakes; explosive volcanic eruptions; oceanic
    6·1 answer
  • Computer A has an overall CPI of 1.3 and can be run at a clock rate of 600 MHz. Computer B has a CPI of 2.5 and can be run at a
    6·1 answer
  • Which of these options highlights the need for learning algorithms
    9·2 answers
  • PLZZZ HELP!!!!!!!
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!