the answer is D. without the right tags the content wont be accurately indexed
Answer
1. Assemble his team
2. Find reason for breach
3. Evaluate what was lost
4. Ensure password change
Explanation:
In case of a suspected breach, the Chief information security officer should first of all assemble his incidence response team. This team should have representatives from all areas of the organization.
Then the reason for the breach and how access was gained has to be found out. An evaluation of what has been lost in the breach would be carried out and it's likely impact on the company.
In case credentials were stolen the CISO has to ensure that the employees change passwords. Also he has to notify all the necessary parties about the breach.
The CISO has to ensure that all employees are trained properly on security and they comply to security policies.
(B) CIO, because they make $308,561 per year and it wouldn’t be A cause they only make $140,265 per year nor would C .
Imagery is a feature of written and spoken language and occurs whenever someone has chosen to use language in a non-literal way.
Imagery is a way of describing something symbolically, using words to create a picture in the reader's imagination.
In the Close Reading paper you need to be able to recognise imagery and to consider how successful the imagery is at conveying to you what the writer is trying to express.
Imagery frequently conveys more than just meaning. It is used to heighten the effect of language and is often an extension of word-choice.
Normally an image will extend to a phrase or a few words but sometimes it will be longer.
The simplest form of imagery to recognise is when something or someone is compared to something else, with the purpose of establishing some parallel between the two. Images of this kind frequently concern qualities like beauty, speed, force, power and natural and animal traits.
As many as it takes of course ;)