1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mariarad [96]
3 years ago
14

What is the first step to understand the potential impact to the business about a Security threat?

Computers and Technology
1 answer:
Anastasy [175]3 years ago
7 0

Answer:

<u>Identify assets and their values</u>

Explanation:

As a security analyst, the first step to determine the potential security threat is to understand

  • what kind of assets needs to be protected?
  • what is the value of such assets?

You might be interested in
True or false
wariber [46]

Answer:

It would definitely be true studied a lot of this stuff.

Explanation:

8 0
3 years ago
For any element in keysList with a value smaller than 40, print the corresponding value in itemsList, followed by a comma (no sp
givi [52]

Answer:

u look se33y yessir

Explanation:

......................................

7 0
3 years ago
a certain kind of fish in the ocean eats only algae. a seal eats this fish a bear eats the seal .when the bear dies,it’s recycle
STatiana [176]

Answer:seal

Explanation:

4 0
3 years ago
A Uniform Resource Locator (URL) is a formatted string of text that web browsers, email applications, and other software program
Fiesta28 [93]

The purpose of a URL is to help users get to websites easier. A URL (Uniform resource locator) is that tab at the top of your web browser that you type into. Like if you want to go to google, you would type in Google.com. So the answer is true.

6 0
3 years ago
Read 2 more answers
The rhythmic note that three beats is called a____half note.
aev [14]

Answer:

it is called a dotted half note

7 0
3 years ago
Read 2 more answers
Other questions:
  • A computer which links several pcs together in a network is called
    10·1 answer
  • ___ is the branch of computer science that explores techniques for incorporating aspects of intelligence into computer systems.
    5·1 answer
  • A layer of control in each communicating device that provides functions such as flow control, error detection, and error control
    13·1 answer
  • There is no way to see how another project in Scratch was made.<br><br> True<br> False
    11·1 answer
  • The algorithm ADDN implements N-bit fixed-width binary addition for non-negative integers and ignores overflows. For example, AD
    13·1 answer
  • Which one of these tasks is part of the pre-production phase of game development?
    11·2 answers
  • Please Help!! How to code this in Python?
    11·1 answer
  • Radio and television are examples of
    9·1 answer
  • Anyone 13 i a boy 13 pan
    12·2 answers
  • Your team has provisioned an Auto Scaling Groups in a single Region. The Auto Scaling Group at max capacity would total 40 EC2 i
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!