1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liq [111]
3 years ago
8

When looking at security standard and compliance, which three (3) are characteristics of best practices, baselines and framework

s
Computers and Technology
1 answer:
Brilliant_brown [7]3 years ago
4 0

Answer:

In order to observe best practices, and to meet with technical and other requirements, organizations often use frameworks for cybersecurity compliance and regulatory compliance. These frameworks provide best practices and guidelines to assist in improving security, optimizing business processes, meeting regulatory requirements, and performing other tasks necessary to achieve specific business objectives such as breaking into a particular market niche or selling to government agencies.

Many such frameworks exist, and the recommendations set out in them can impose difficult and often expensive demands on enterprise resources – especially in situations where an organization is subject to a number of regulatory compliance regimes, whose requirements it has to meet while maintaining its own strong cybersecurity status.

Explanation:

You might be interested in
TRY IT Choose the Right Technology MP3 player Widescreen laptop computer Smartphone Tablet computer with wireless Internet Suppo
Gnoma [55]

is this like a story or sum

3 0
3 years ago
Read 2 more answers
When a primary key combines two or more fields, it is called a ____ key?
Tanya [424]
<span>When a primary key combines two or more fields, it is called a ____ key
the answer is Constructed key</span>
6 0
3 years ago
QUIZLET Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer networ
anastassius [24]

Answer:Screening

Explanation:Packet screening is the process in which whenever a packet is received at the destination port, there is the examining of the packet.The examination of the packet rote from source to destination takes place. The screening takes place for evaluating that the data in the packet is adequate and carries no error that can risk in the security, tracks the routes  of the packet path etc.

5 0
3 years ago
The leading membranophone in "Kan andi ghazal" is the ________. (If you can not access the audio file here, please go to modules
ICE Princess25 [194]

Answer:

Tabl Baladi

Explanation:

The Tabl Baladi is a large drum with wood frame and heavy skin on both sides. It is hung by a belt around the player's shoulder is and played with two sticks: the thick one is for the dum sound played with the dominant hand, and the thin stick is for the tak sound played with the other hand.

It is mostly used in classical Arab (Middle Eastern) music. Kan Andi Ghazal is a song by the Lebanese musician Wael Jassar.

5 0
4 years ago
What is the result of the following code fragment?
anastassius [24]

Answer:

D

Explanation:

I don't know the language, but it is clear what is going on.

It looks like you are defining a value for a in both commands.

a.multiply(b); looks like you take the value in a (which is 10) multiply it by 25 and put the result back in a. So so far we have 10 * 25 = 250

Note the next command

a.add(b)

looks like you take the current value in a(which is now 250)

and put the value of b (which has not been changed. It is still 25) and put that in a (which is 250).

The result is 250 + 25 = 275

The answer is D. Since I only understand the logic, if this answer is wrong, I wish you'd leave a note.

4 0
3 years ago
Other questions:
  • To what device, inside the computer, do all other devices connect
    10·2 answers
  • You are a member of the Administrators group on all company computers. You are having difficulty changing permissions for a fold
    11·1 answer
  • Write a function "nonRepeatings" that takes a string "s3" and returns the non-repeating characters in this string. Sample Input
    11·1 answer
  • Use BlueJ to write a program that reads a sequence of data for several car objects from an input file. It stores the data in an
    5·1 answer
  • Pamela finds that she is constantly spelling the word “color” as “colour” when she is typing. Even though this is how the word i
    11·1 answer
  • Who tryna play among us
    8·2 answers
  • Work-based learning can be defined as educational experiences that focus on
    11·1 answer
  • During side show mode, hitting the B key will do which one of these?
    7·1 answer
  • Given the number of every players of two cricket team to find the winner team and find total half-century,in C program
    14·1 answer
  • When two well-informed people have different perspectives on a problem, it is often because they are focusing on a different app
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!