1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mariarad [96]
4 years ago
14

What is the first step to understand the potential impact to the business about a Security threat?

Computers and Technology
1 answer:
Anastasy [175]4 years ago
7 0

Answer:

<u>Identify assets and their values</u>

Explanation:

As a security analyst, the first step to determine the potential security threat is to understand

  • what kind of assets needs to be protected?
  • what is the value of such assets?

You might be interested in
Concept tests in the screening and evaluation stage of the new-product process rely on written descriptions, sketches, or mock-u
pochemuha

Answer:

The answer is "Actual products".

Explanation:

The key purpose of this research is to better analyze the concepts, which is done to establish customer buying expectations and perceptions of the item. The key point is to assess the consumers ' initial response to the product idea.

  • This concept testing is also known as a creation, it is an advantage, which can be conveyed to the user to test their reactions.  
  • In conceptual testing, it is a quality check between the design definition and the actual production of the product.

6 0
4 years ago
Work with a partner to answer the following question: How might learning the language
AysviL [449]

Answer:

easy to learn is one similarity

longer experience needed is on difference

HOPE THIS HELPS .......

4 0
3 years ago
In the following code fragment, how many times is the count() method called as a function of the variable n? Use big-O notation,
ahrayia [7]

Answer:

The loop counts the count() function length of n-1 times with respect to n.

Explanation:

The first and outer loop counts for two times as the variable declared in the condition counts before the iteration is made. The same goes for the other for statements in the source code.

The n represents the number length of a range of numbers or iterables (like an array).

4 0
3 years ago
Before using your Twitter account to market your personal brand, you should evaluate Your profile picture Your bio Your tweets A
AnnZ [28]
D. All of the Above.

If you are using a Twitter account for marketing your personal brand, you certainly should evaluate your entire profile, which includes your pictures, bio and tweets.  
5 0
3 years ago
How to make stuff bigger and smaller in photoshop?
Oksana_A [137]
It depends on what software or application you are using.
7 0
4 years ago
Other questions:
  • MTV can now be seen by most of the world's population. This is an example of
    7·1 answer
  • In a speech at a research conference, a computer expert stated that shopping centers would become obsolete in the future. He bel
    8·1 answer
  • The Hazard Communication Standard, commonly called the “Right-to-Know” law, gives you the right to know what information?
    6·2 answers
  • How long does it take to wash 12 t-shirts in the quickest way?​
    15·2 answers
  • The force required to slide an object is equal to _____.
    13·1 answer
  • Ria and her team ....................... they will win. *
    8·1 answer
  • CHALLENGE ACTIVITY
    6·1 answer
  • Suppose a class Car and its subclass Honda both have a method called speed as part of the class definition. rentalH refers to an
    5·1 answer
  • write ms-dos command to list all the files and folders of EIGHT sub directory of C: drive in ascending order according to file n
    5·1 answer
  • _________ is the method used by password crackers who work with pre-calculated hashes of all passwords possible within a certain
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!