1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ipatiy [6.2K]
3 years ago
12

Who is responsible about developing the security policy in your organization?

Computers and Technology
2 answers:
riadik2000 [5.3K]3 years ago
4 0

Answer:

Security adviser

Explanation:

ladessa [460]3 years ago
4 0

Answer: the CISO

Explanation: The CISO is responsible for the development, implementation, and maintenance of a comprehensive information security program.

You might be interested in
Assume that name is a variable of type string that has been assigned a value . write an expression whose value is the first char
4vir4ik [10]

For the first question, you would just add the parenthesis to the string mutation1:

String word = "sadly";

String mutation1 = "(" + word + ")";

For the second you need the method substring from the String class:

It is defined as String.substring(begining, ending);

String name = "Smith";

String firstCharacter = name.substring(0, 1);

0 is considered the beginning of the string, then you get the next 1 characters.

7 0
3 years ago
Supermarket managers who use scanners on the checkout counters to track inventory levels of their products are using a(n) ______
lidiya [134]
Operation Information System, because you are only collecting data on the amount of products leaving the store.
6 0
4 years ago
Please tell fast plzzzzzz​
Nata [24]

Answer:

heyyy

your answer is false

HOPE IT HELPS YOU OUT PLEASE MARK IT AS BRAINLIEST AND FOLLOW ME PROMISE YOU TO FOLLOW BACK ON BRAINLY.IN

7 0
3 years ago
Read 2 more answers
Several different tunneling protocols can be used in dial-up situations. Which of the following would best be used as a VPN tunn
melomori [17]

Answer:

The answer is the point - to -point protocol, which allows user to set a secure VPN connection for client and server connectivity.

Explanation:

A virtual private network is a private-public network because of encryption and tunneling to ensure the integrity of the data. VPN requires a tunnel to work and encryption.

In VPNs, there are different protocols can be used, such as point- to - Point Tunneling Protocol (PPTP), IPSec, and L2TP.

Point to Point Protocol is a Microsoft protocol which allows user to set a connection and secure VPN destination. Point to point protocol is designed for client and server connectivity. It developed a connection between two computers. The data link layer that transmits over IP networks is used for point to point tunneling.

Such as option A is not correct because it is distracter and IPSecis primary tunneling protocol. It supports only IP networks. L2TP is not a VPN but extend VPN over the various network.

3 0
4 years ago
Please name the OOP term that allows children classes to have methods with the same names as methods in their parents.
RSB [31]

Answer:

Inheritance

Explanation:

3 0
3 years ago
Other questions:
  • Why was the movable type of the printing press such a breakthrough for publishing?
    15·2 answers
  • Which option is NOT in the Link to portion of the Insert Hyperlink dialog box?
    5·2 answers
  • Modify your solution to Problem 8.24 so that one (and only one) child installs a Segmentation-fault handler which prints an erro
    10·1 answer
  • How many data bits are sent in a single psk31 character?
    15·1 answer
  • If your presentation uses a background, your text should
    10·2 answers
  • Create a Python dictionary that returns a list of values for each key. The key can be whatever type you want.
    9·1 answer
  • The
    12·2 answers
  • What is NOT a built-in function in python?<br> sqrt()<br> string()<br> fabs()<br> O print()
    12·2 answers
  • We want to use image processing to detect cats in images, how do you do it? Please write down the steps.
    9·1 answer
  • Just a smol question how do i change my username on this?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!