1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
exis [7]
3 years ago
12

A Development team begins work on a new software application and decides to involve the client’s IT experts to ensure that secur

ity concerns are addressed on an ongoing basis throughout the project’s lifecycle. Which security capability is responsible for securing the software?
Computers and Technology
1 answer:
Nataly_w [17]3 years ago
3 0
The organization is responsible for securing the confidential whiles the risk management access the threats and potential
You might be interested in
Good Morning! Please Help!
vova2212 [387]

Answer:

cyber bullying

rights

technology

speech

education

study

issues

Explanation:

4 0
3 years ago
What precautions should be taken to make a computer more secure ​
Sergeeva-Olga [200]

Answer:

To make a computer more secure

Explanation:

we have following ways :

1)we should have anti virus to protect our computer.

2)we should not play or look computer for a long time because it destroy our files

4 0
3 years ago
Select the correct answer.
grandymaker [24]

Answer: C

Explanation:

5 0
3 years ago
Alcohol and drugs
vitfil [10]
I would have to say B
3 0
3 years ago
A dns query failure is referred to a higher level domain name server under what condition
zalisa [80]
Within the Flags detail is a flag titled recursion desired. This flag shows whether or not the local DNS should continue to query other DNSs if it is not able to resolve the current query. As DNS is local, it may or may not have the enough information to allow the address to be resolved. If the recursion flag is set, the local <span>DNS will continue to query higher level DNSs until it is able to resolve the address.  In short, t</span>he condition is when a flag is raised and it doesn’t have enough <span>information to allow the request.</span>
5 0
3 years ago
Read 2 more answers
Other questions:
  • In which of the following stages of the development process is a team MOST likely to interview a potential user of an app?
    6·1 answer
  • If everyone's choice for their computer printer were an hp laserjet 4100, there would be a ___ preference segment in the compute
    8·1 answer
  • What feature is available to add a suggestion in the margin of someone else's document?
    7·1 answer
  • Successful Alignment of IT with Business/Project Prioritization Refer to the readings for this week on aligning IT to the busine
    10·1 answer
  • Which ammunition security category includes fragmentation grenades mines and explosives?
    5·1 answer
  • You need a collection to represent secret agents. Every agent has a unique codename that identifies them, and an Agent object th
    14·1 answer
  • RAM that can be changed. True or False
    9·2 answers
  • Who first demonstrated the computer mouse ?
    11·1 answer
  • Which is the fastest memory in computer​
    9·2 answers
  • Computers and their input and output devices require power to work and may have many power cords. What is the safest way to orga
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!