1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergij07 [2.7K]
3 years ago
8

Which family of controls included in the risk management Infrastructure is related to preventing the use of unauthorized codes?​

Computers and Technology
1 answer:
goldenfox [79]3 years ago
3 0

Answer:

Operational Security Control

Explanation:

The family of controls included in the risk management Infrastructure that is related to preventing the use of unauthorized codes is known as "Operational Security Control."

This is because Operational Security Control defines potency of controls which involves the access controls, including the use of unauthorized codes, authentication, and security measures made to networks, systems, and applications.

You might be interested in
What are the first steps in creating a business document
prohojiy [21]
First you must pick what application you want to do your document on and chose how you want to map out your document.
4 0
3 years ago
Read 2 more answers
Pls help!!!!!!!!!!!!
son4ous [18]

Answer:

i am 100% sure it is (B)

Explanation:

To delete offensive or irrelevant posts  

5 0
3 years ago
Complete the sentence.
Galina-37 [17]
The answer is number 2 accessible
5 0
2 years ago
What is the value of j after this code is executed? int i = 6, int j=10; j+=i;
stich3 [128]

Answer:

16

Explanation:

+= is an assignment operator that adds a value to the existing value.

4 0
3 years ago
Ayat topik berlimu pegetahunan​
ryzh [129]

Answer:

Nasan yong pic hahahahah

7 0
2 years ago
Other questions:
  • Describe the indicators and hazards of a metal deck roof fire in an unprotected steel joist warehouse as well as the techniques
    6·1 answer
  • Create one of these on your desktop start menu and use it to quickly open a folder, data file, program, or other object?
    13·1 answer
  • Julian downloaded some of the music he created to play for his friend. Julian's friend wore headphones to listen to the music. A
    6·2 answers
  • What happened to motion pictures when television became popular?
    8·1 answer
  • A mother age is formed by reversing the two digits of daughters age. If the mother is 18 years older than daughter and sum of th
    5·1 answer
  • Heelp my brainly stuff says i am 49 but im 11 how to fix?X??
    7·1 answer
  • _____ transparency exists when the end user or programmer must specify the database fragment names but does not need to specify
    5·1 answer
  • Using complete sentences post a detailed response to the following.
    5·2 answers
  • Climatologist use weather balloons, stethoscopes, and satellites true or false
    14·1 answer
  • Who ever can get me the lyrics to raining tacos will get 46 points + the crown! i want the song!
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!