1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liq [111]
3 years ago
8

When looking at security standard and compliance, which three (3) are characteristics of best practices, baselines and framework

s
Computers and Technology
1 answer:
Brilliant_brown [7]3 years ago
4 0

Answer:

In order to observe best practices, and to meet with technical and other requirements, organizations often use frameworks for cybersecurity compliance and regulatory compliance. These frameworks provide best practices and guidelines to assist in improving security, optimizing business processes, meeting regulatory requirements, and performing other tasks necessary to achieve specific business objectives such as breaking into a particular market niche or selling to government agencies.

Many such frameworks exist, and the recommendations set out in them can impose difficult and often expensive demands on enterprise resources – especially in situations where an organization is subject to a number of regulatory compliance regimes, whose requirements it has to meet while maintaining its own strong cybersecurity status.

Explanation:

You might be interested in
In spreadsheet programs, labels and constant values are always copied exactly to the new location; what happens to formulas when
Dima020 [189]

Answer:

absolute cell referencing

Explanation:

Excel has an A1 reference style, which means that the columns are called letters A to XFD and the rows have numbers, 1 to 1,048,576. The total number of columns in Excel 2007 is 16384.

A cell can contain a value, formula or constants. A formula begins with a sign = (equal). You can use values ​​from other cells in your formula. To use another value, create a reference to the cell that contains the value you want to use in your formula.

When you copy a cell that contains a relative reference and paste it into another cell, the relative reference changes

When you copy a formula that contains relative references, the reference changes when you paste it into another cell.

How much the reference changes in relation to the position of the copied cell and the position of the new cell in which the formula is pasted. Excel uses relative references by default.

Instead, an absolute reference in a formula remains the same if it is copied to another cell.

8 0
4 years ago
Following rules of compaction, the IPv6 address 2001:0db8:0000:0000:0000:ff00:0012:3456 could also be written as _______.
vampirchik [111]

In regards to the rules of compaction, the IPv6 address 2001:0db8:0000:0000:0000:ff00:0012:3456 could also be written as 2001:db8::ff00:12:3456.

<h3>What is IPv6?</h3>

The IPv6 address is known to be a form of Internet Layer protocol made for packet-switched internetworking and it helps to give  an end-to-end datagram movement in course of multiple IP networks.

Note that, In regards to the rules of compaction, the IPv6 address 2001:0db8:0000:0000:0000:ff00:0012:3456 could also be written as 2001:db8::ff00:12:3456.

Learn more aboutIPv6 address   from

brainly.com/question/5296366

#SPJ1

4 0
2 years ago
Convert ⅖ pie radian to degree​
aniked [119]

Answer:

Convert to a decimal.

22.9183118°

Explanation:

7 0
3 years ago
Handhed computer is otherwise called as<br> 1.laptop<br> 2.Notebook<br> 3.Palmtop
NikAS [45]

Answer:

personal digital assistants (PDAs)palmtop

3 0
3 years ago
What are the constraints of mine shaft head gear​
Serhud [2]

Answer:

Mine headgear constructions support wheel mechanisms for suspending winding cables that transport workers and ore up and down deep level shafts. These strange anthropomorphic structures have become the iconic symbol for mining.

4 0
3 years ago
Other questions:
  • The intensity of force acting on a rock body is expressed as
    14·1 answer
  • Which formal security-related process should take place at the beginning of the code creation project? Group of answer choices R
    13·1 answer
  • ___signs tell you what you can or can't do, and what you must do ?
    5·2 answers
  • Which of the following are examples of software? (Select all that apply)
    9·2 answers
  • What pc games do you all play?
    14·2 answers
  • Helllllllllppppppppppp
    9·1 answer
  • Which IDEs support multiple high-level programming languages? Select all that apply.
    13·1 answer
  • Define the html code to insert a heading
    14·1 answer
  • How do you add verticse in edit mode blender
    5·1 answer
  • Plsssssssss help me​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!