answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
JulsSmile [24]
2 years ago
8

A chief Information Security Officer (CISO) is performing a BIA for the organization in case of a natural disaster. Which of the

following should be at the top of the CISO's list?
a. identify redundant and high-availability systems
b. identify mission-critical applications and systems
c. identify the single point of failure in the systems
d. identify the impact on safety of the property
Computers and Technology
1 answer:
nataly862011 [7]2 years ago
4 0

Answer:

The correct answer is option (D) Identify the impact on safety of the property

Explanation:

Solution

In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.

Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take  away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is  doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.

Example of property can be software, equipment, facilities, company’s assets.

You might be interested in
Which of these statements regarding mobile games is true? A. They are typically played indoors. B. They have detailed environmen
Lyrx [107]

Answer:

c and d

Explanation:

6 0
2 years ago
1. Discuss why it is so important for all application builders to always check data received from unknown sources, such as Web a
Ivan

Answer:

1. It is so important for all application builders to always check data received from unknown sources before using that data. This is because of the Security related reasons and vulnerabilities .For example the data received might contain harmful hidden viruses.  Web applications are accessed by internet and these are the most vulnerable to attacks by hacker or intruders using harmful data containing malware. This can cause security breaches due to the security flaws or bugs in Web applications. So to overcome such security risks which can cause damage in the Web applications, data from unknown sources should be checked.

Explanation:

2. When the Website is being used and running, there is a room for possible glitches or other bugs and issues. To understand, handle and address  issues successfully, the website operators carefully and consistently patch and configure their systems. The administrators collect the user data which enables them to have enough data in order to make the requisite alterations or improvements in the website. This also helps to improve the website performance. The patching and configuring of systems fix problems in the website which reduces the risk of website damage and the website works smoothly this way. Moreover it identifies vulnerabilities, solve configuration issues and upgrades in website features provide additional capabilities to the website.

8 0
2 years ago
In the range D5:D9 on all five worksheets, Gilberto wants to project next year's sales for each accessory, rounded up to zero de
Maksim231197 [3]

Answer:

Enter the following in D5:

=ROUNDUP((SUM(B5,B5)*C5),0)

Explanation:

Required

Add up B5 and B5, then multiply by C5.

Save result rounded up to 0 decimal places in D5

The required computation can be represented as:

D5 = (B5 + B5) * C5 <em>[Approximated to 0 decimal places]</em>

In Excel, the formula is:

=ROUNDUP((SUM(B5,B5)*C5),0)

Analyzing the above formula:

= ---> This begins all excel formulas

ROUNDUP( -> Rounds up the computation

(SUM(B5,B5) ---> Add B5 to B5

*C5) --> Multiply the above sum by C5

,0) ---> The computation is rounded up to 0 decimal places

To get the formula in D6 to D9, simply drag the formula from D5 down to D9.

The resulting formula will be:

=ROUNDUP((SUM(B6,B6)*C6),0)

=ROUNDUP((SUM(B7,B7)*C7),0)

=ROUNDUP((SUM(B8,B8)*C8),0)

=ROUNDUP((SUM(B9,B9)*C9),0)

8 0
2 years ago
What Information Technology is Walt Thomas responsible for?
adelina 88 [10]
Proactive designing i think
3 0
2 years ago
Read 2 more answers
Each row of the scoring guide one is worth one point, so response 2d is worth up to 2 points total. Should the student get 0, 1
maksim [4K]

Answer:mmmmm

Explanation:

5 0
2 years ago
Read 2 more answers
Other questions:
  • Which statement best describes how the rapid prototyping model works?a) Developers create prototypes to show stakeholders how va
    11·2 answers
  • Janice is unsure about her future career path she has grown up on her family farm but she is also interested in medicine Janice
    5·1 answer
  • What company built its first computer from a wooden box
    12·2 answers
  • The spreadsheet below shows the names years in office, and number of terms for five US presidents
    7·2 answers
  • ____ twisted pair is the least quality twisted pair wire that should be used in a data/voice application.
    9·1 answer
  • Which broad area of data mining applications analyzes data, forming rules to distinguish between defined classes?
    13·1 answer
  • What is the distance rn between the point of application of n⃗ and the axis of rotation? what is the distance rw between the poi
    15·1 answer
  • suppose that you have been given the task of writing an unloader - that is, a piece of software that can take the image of a pro
    9·1 answer
  • How does the discussion of “Luddites,” “Marx,” and “John Maynard Keynes” in paragraph 21 contribute to the development of the id
    7·1 answer
  • Write a MATLAB function named lin_spaced_vector with two inputs and one return value. The first input will be a single real numb
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!