1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mama L [17]
3 years ago
10

Which of the following is not true?A. An organization may express its cybersecurity state through a Current Profile to report re

sults or to compare with acquisition requirements.B. Only critical infrastructure agencies may establish a Target Profile that can be used among their constituents as an initial baseline Profile to build their tailored Target Profiles.C. An organization may utilize a Target Profile to express cybersecurity risk management requirements to an external service provider (for example, a cloud provider to which it is exporting data).D. A critical infrastructure owner/operator, having identified an external partner on whom that infrastructure depends, may use a Target Profile to convey required categories and subcategories.
Computers and Technology
1 answer:
STALIN [3.7K]3 years ago
8 0

Answer: B. Only critical infrastructure agencies may establish a Target Profile that can be used among their constituents as an initial baseline Profile to build their tailored Target Profiles.

Explanation:

Of the options given in the question, the option that is false is option B "requirements.B. Only critical infrastructure agencies may establish a Target Profile that can be used among their constituents as an initial baseline Profile to build their tailored Target Profiles".

This is not true as the establishment of a target profile is not meant for the critical infrastructure agencies alone. Other infrastructural agencies or companies can also establish the target profile.

You might be interested in
A short cut to save a file is
Vanyuwa [196]

Answer:

CTRL+S in most programs

8 0
2 years ago
What is the different between information and data
Scorpion4ik [409]

Answer:

Information is the act of imparting knowledge and data is the recorded observation that are usually presented in a structured format

6 0
3 years ago
Lots of Ways to Use Math.random() in JavaScript
Alja [10]

Math.random() is a built-in function in JavaScript that generates a random number between 0 and 1.

<h3>What is Math.random()?</h3>

Math.random() is a useful and versatile function that can add a element of randomness to your JavaScript programs.

This function can be used in a variety of ways in JavaScript programs, such as:

  1. Generating random numbers for games or simulations.
  2. Creating random samples for statistical analysis.
  3. Shuffling elements in an array for a random order.
  4. Selecting random items from a list for a quiz or survey.
  5. Creating unique IDs or keys for objects in a database.

To Know More About built-in function, Check Out

brainly.com/question/29796505

#SPJ4

8 0
1 year ago
Bytes are typically represented with a lowercase b and bits with an uppercase B.<br> true or false
34kurt

Answer:

False

Explanation:

Byte(B) is uppercase

bit(b) is lowercase

Good way to remember is that its takes 8 bits makes a byte. In other word, a byte is bigger than a bit so it makes sense that byte is uppercase.

7 0
3 years ago
1. Write a generic method that compares its 2 arguments using the equals method and returns true if they are equal and false oth
Ganezh [65]

Answer:

Explanation:

The following piece of code is written in Java. It creates the method as requested that takes in two generic objects and compares them using the .equals() built in Java method. This method will return True if the objects are identical or False if they are not. A test case is used in the code and the output can be seen in the attached image below.

   public static <T> boolean comparePerez(T a, T b) {

       return a.equals(b);

   }

5 0
3 years ago
Other questions:
  • When creating an input/ output table, where do you enter the formula?
    5·1 answer
  • What is computer hacking?
    11·2 answers
  • Many computer magazines and Web sites present comparisons of several DBMSs. Find one such DBMS comparison article and compare th
    10·1 answer
  • What is the information that there are 24 hours in a day and 365 days in a year considered?
    6·2 answers
  • For her homework, Annie has added the picture of a fruit in a document. She wants to enhance it to give a cut-out look. Which fe
    5·2 answers
  • The ______ printers are the most popular type of printer in small office/home office and large office environments.
    5·1 answer
  • I neeeeeeeeeeeddddddddddddd help plz ppl
    10·2 answers
  • A social cause is: O A. when one person protests without the support of others. B. something that not many citizens think or car
    8·1 answer
  • Compare the two items in a summary of qualifications taken from a resumé. Which is better?
    9·1 answer
  • What are some best practices for file management
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!