1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
creativ13 [48]
4 years ago
10

True or False: It is the CISO❝s responsibility to ensure that InfoSec functions are performed within an organization. A) True B)

False
Computers and Technology
1 answer:
algol [13]4 years ago
3 0

Answer: True

Explanation: CISO(Chief information security officer) is the officer that is responsible for the information security(Infosec) function to be implemented in the organization.He/she manages the procedures, protect from the threats in business, secures the enterprise communication.

The post of CISO is considered as a senior level officer .The responsibilities of the CISO also includes getting along with other section of the organization and assuring about the smooth and secured processing of the business work as the aspect of information security.Thus the statement given is true

You might be interested in
Who was responsible for unleashing the melissa computer virus
CaHeK987 [17]

Answer:

David L. Smith

Explanation:

Around March 26, 1999, the Melissa virus was released by David L. Smith

‘Melissa.A’ used social engineering techniques, since it came with the message “Here is the document you asked me for…  do not show it to anyone”. In just a few days, she starred in one of the most important cases of massive infection in history, causing damage of more than 80 million dollars to American companies. Companies like Microsoft, Intel and Lucent Technologies had to block their Internet connections due to its action.

How it Works

When opening a document infected with the ‘Melissa.A’, the virus creates an e-mail with the following features:

Subject: Important Message From “sender name”

Text: Here is that document you asked for … do not show anyone else

Attachments: a file with a DOC.

The recipients of this message were the first 50 addresses ‘Melissa.A’ found in the address book in Outlook. This was the first macro virus that used this technique, until this moment there hadn’t been a virus that affected users by sending a Word document within an email.

What Happened

The creator of ‘Melissa.A’, David L. Smith, pleaded guilty but said he did not expect such high economic damage. This malware was created in memory of a topless dancer in Florida with whom he had fallen in love with.

Smith was sentenced to 10 years in prison.

6 0
3 years ago
7. Define ports including standard and<br>specialized ports. Give examples of each.​
Montano1993 [528]

Answer:

An example of a standard port is USB (universal serial bus) which connects several devices to the system unit. An example of a specialized port is Thunderbolt which is identified by Apple's MacBook Pro and provides a high-speed connection promising to replace a number of ports such as Mini Display port.

Explanation:

Please give brainlest

5 0
3 years ago
3. Write a program that inputs 4 hexadecimal digits as strings (example 7F), converts the string digits to a long – use strtol(i
never [62]

Answer:

#include <stdio.h>

#include <stdlib.h>

int main()

{

char num1[20],num2[20],num3[20],num4[20];

//Checks where the conversion of string to long stops and is required by strtol

char *ptr;

//Stores the converted number string into long.

long result_num1,result_num2,result_num3,result_num4;

//Prompt to enter all the four hexadecimal numbers.

printf("Enter the first hexadecimal number: ");

scanf("%s",num1);

printf("Enter the second hexadecimal number: ");

scanf("%s",num2);

printf("Enter the third hexadecimal number: ");

scanf("%s",num3);

printf("Enter the fourth hexadecimal number: ");

scanf("%s",num4);

//Converting the hexadecimal numbers into long using strtol() function with base 16 for hexadecimal.

result_num1 = strtol(num1,&ptr,16);

result_num2 = strtol(num2,&ptr,16);

result_num3 = strtol(num3,&ptr,16);

result_num4 = strtol(num4,&ptr,16);

//Casting the long to unsigned chars.

unsigned char numb1 = (unsigned char)result_num1;

unsigned char numb2 = (unsigned char)result_num2;

unsigned char numb3 = (unsigned char)result_num3;

unsigned char numb4 = (unsigned char)result_num4;

//Applying the boolean operation on unsigned chars and storing the resultant value in result.

unsigned char result = ((numb1&numb2)|numb3)^numb4;

//Printing the result in capital hex ("%X" take care of this).

printf("%X",result);

return 0;

}

Code OUTPUT

Enter the first hexadecimal number: 1 Enter the second hexadecimal number:2

Enter the third hexadecimal number: 3 Enter the fourth hexadecimal number: 4 Resultant Value: 7 Process returned o (0×0) execution time : 3.076 s

Press any key to continue

4 0
3 years ago
In which situation is coauthoring of presentations primarily utilized?
fenix001 [56]

Answer:

C) Multiple reviewers have to be able to view one another's changes after they are made.

Explanation:

5 0
3 years ago
Video-sharing sites such as youtube and vimeo provide a place to post short videos called clips, true or false?
yaroslaw [1]
<span>It is true that video-sharing sites such as Youtube and Vimeo provide a place to post short videos called clips. Nowadays, these videos aren't only short, because even full-length movies can be posted on Youtube. This platform has become an important place for contemporary creators given that it provides them with a location and money to share their creative thoughts with the world. Youtube is becoming more and more important today, which is obvious if you take a look at the number of visitors each month and the money that Youtube earns from its creators.</span>
4 0
4 years ago
Other questions:
  • Jeremy is designing a website for a local pizza place. What is the appropriate resolution for him to set his images to?
    5·1 answer
  • How do I only give 5 points and not 10?
    7·1 answer
  • For which is a chart Legend used
    5·2 answers
  • Web and mobile applications are created for users to only read information. True False
    15·2 answers
  • What device provides a strong magnetic field used to completely erase data on a hard drive or tape drive?
    5·1 answer
  • What stage in the process of media production involves discussing the budget and timelines as well as identifying stakeholders?
    15·1 answer
  • You must regularly do this on your computer to prevent a virus from infecting it​
    9·2 answers
  • What software application can be used to send and receive email messaging and management appointments in calendar's
    11·1 answer
  • How did the invention of the printing press affect society?
    5·1 answer
  • Where does blood travel when it leaves the right ventricle of the heart
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!