Chemical reactions in the material used to make matches, and the cardboard... so hope this helps :)
NOTE: im not to good at this stuff so i rlllllly hope it helps
Answer
1. Assemble his team
2. Find reason for breach
3. Evaluate what was lost
4. Ensure password change
Explanation:
In case of a suspected breach, the Chief information security officer should first of all assemble his incidence response team. This team should have representatives from all areas of the organization.
Then the reason for the breach and how access was gained has to be found out. An evaluation of what has been lost in the breach would be carried out and it's likely impact on the company.
In case credentials were stolen the CISO has to ensure that the employees change passwords. Also he has to notify all the necessary parties about the breach.
The CISO has to ensure that all employees are trained properly on security and they comply to security policies.
Answer:
B. External systems and technology architecture.
Explanation:
In such environment, you have to know what external systems are in place so have proper communication with External Systems whether be in message format or web/networks, Communication protocols, Security methods, Error detection and recovery,
Additionally, it consits of technology architecture so conforming to an existing technology architecture helps us discover and describe existing architecture
Answer:
Option b the development of one or a few related analytics applications.
Explanation:
Data silo is the isolated information in an organization which is not shared across different departments. Data silo could exist because one department in an organization may not see the necessity to share information to other department. Or the information is deemed as unique data which is dedicated to develop one or a few very specific analytics applications. Data silos should be minimized if an organization intends to develop a data analytics system that support in enterprise wide level.
Answer:
I think that the answer is A