1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
damaskus [11]
3 years ago
13

Which of the following is a set of security controls designed to protect payment account security such as a credit card transact

ion?
CIS Critical Security Control
ONIST Framework
OPII Framework
Payment Card Industry Data Security Standard (PCI DSS)
Computers and Technology
2 answers:
Marina CMI [18]3 years ago
7 0
It’s the ONIST Framework
PtichkaEL [24]3 years ago
3 0
It onsit framework hope it helps
You might be interested in
A trust domain is defined as Select one: a. The agreed upon, trusted third party b. A scenario where one user needs to validate
soldier1979 [14.2K]

Answer:

A construct of systems, personnel, applications, protocols, technologies, and policies that work together to provide a certain level of protection

Explanation:

Creation of dynamic Trust Domains can be realized through collaborative, secure sharing solutions. The local system is able to trust a domain to authenticate users. If an application or a user is authenticated by a trusted domain, all domains accept the authenticating domain. For instance, if a system trust domain X, it will also trust all domains that domain X trusts. It is a two-way trust relationship and is transitive.

7 0
3 years ago
Read 2 more answers
To enter new code that performs as intended in the place of the old code that produces an error is the goal of
Tanzania [10]

Answer:

Fixing code in a software program.

Explanation:

It is regarded the easiest application development method, that is in many cases the standard (method)

Fixing code well into the software program because they came to realize that there was some error while they compose the program, then he will modify the program and then they will fix that again.

5 0
3 years ago
Investigar cuáles son los Sistemas Operativos más utilizados en la actualidad. ¿cuáles son las características principales de ca
RoseWind [281]

Answer:

Un sistema operativo es un programa de computadora o colección de programas de computadora que tiene como objetivo facilitar el uso de una computadora, proporcionando el enlace entre el hardware de la computadora y los programas de aplicación que el usuario desea ejecutar en la computadora. El sistema operativo es responsable de la gestión del hardware central, la coordinación de las actividades informáticas y la distribución de recursos en la computadora. Puede verse como lo "básico" de la computadora: un conjunto estandarizado de reglas que determina cómo los programas y los usuarios pueden usar las diferentes partes de la computadora.

Los sistemas operativos modernos comunes incluyen Microsoft Windows, Mac OS, Linux, BSD y Solaris. Microsoft Windows tiene una fuerte participación de mercado dominante para computadoras de escritorio y portátiles. Sin embargo, las computadoras que se usan como servidores ejecutan con mayor frecuencia Linux u otros sistemas similares a Unix.

4 0
3 years ago
Budd, the purchasing agent of Lake Hardware Wholesalers, has a relative who owns a retail hardware store. Budd arranged for hard
Misha Larkins [42]

Answer:

We cannot answer this question!

Explanation:

Because the question is incomplete!

8 0
3 years ago
Which site acquired by Warner Bros. in 2011 allows users to rate movies and watch movie trailers?
mel-nik [20]
It was flixter.
hope this helps
7 0
3 years ago
Read 2 more answers
Other questions:
  • A user can easily move to the end of a document by pressing the _____ key combination.
    10·2 answers
  • What is the advantage of using a subject directory like the public internet library ?
    11·1 answer
  • What is data anayltics
    5·1 answer
  • The bantu and arabic languages blended, creating what new language?
    14·2 answers
  • Research different ways that 3D printing is used in society. Tell us about the items that are 3D printed.
    8·2 answers
  • Hackers often argue that hacking is for the good of all people because it points out flaws in computer systems. do you agree wit
    6·1 answer
  • In the following code, what is the first line that introduces a memory leak into the program?
    6·1 answer
  • 5. The operating system has two components
    12·2 answers
  • 3. Create mode was one of the most innovative and influential features of which of the following games?
    7·1 answer
  • Which of the following identifies the most appropriate courses to take in high school for someone interested in becoming a mecha
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!