answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitriy789 [7]
2 years ago
6

Which major NIMS Component describes systems and methods that help to ensure that incident personnel and other decision makers h

ave the means and information they need to make and communicate decisions?
Computers and Technology
2 answers:
Elodia [21]2 years ago
9 0

Answer:

Communication Management and Information Management is the correct answer.

Explanation:

Because this explains the functions and the systems that help to make secure that decisions which are taken by the other and also for that incident personnel which have the data they want to communication and information decision. These are the components of the NIMS. So, that's why the following answer is correct.

frutty [35]2 years ago
4 0

Answer:

1.Communication Management

2.Information Management

Explanation:

NIMS has introduced COMMUNICATION management system that determines if the decision makers has the ways to communicate decisions. It has standards that defines the ways that can be used by the personnel to communicate the decisions in a better and efficient manner.

NIMS has also a system which is primarily introduced to check the the personnel has the information to make and communicate decisions called Information management. Again, it also has the templates that defines that how information should be spread considering the confidentiality of the information.

You might be interested in
A natural language processor reads the sentence The walk was tiring and mistakes the noun “walk” as a verb. What is such an erro
Ray Of Light [21]

Answer: Which of these is a compound morphology? (A. bookkeeper = book + keeper)

The software first uses (NLU) to map and analyze the input. It then creates the output using (NLG).

(It works by mapping input to representation and analyzing them.)

What type of morphology does this follow? (D. derivational morphology)

What is such an error called? (C. lexical ambiguity)

Explanation: Plato

4 0
2 years ago
The Company management has asked that you compare the OSSTMM and the PTES to determine which methodology to select for internal
Sonbull [250]

Answer:

The basic comaprism of OSSTMN and PTES includes the following: OSSTMN is more theoretical, security assessment methodology, and Metrics based why PTES is technology oriented, penetration testing methodology ,  extended analysis of all stages

Explanation:

Solution

Penetration testing has several methodologies which include :OSSTMM and PTES  

The comparison between OSSTMM and PTES is stated as follows:

OSSTMM:                                                

Security assessment methodology

More Theoretical  

Metrics based

PTES :

Technology oriented

Penetration testing methodology

Extended analysis of all stages

Now,

There are 7 stages which is used to define PTES for penetration testing.(Penetration Testing Execution Standard)

  • Pre-engagement Interactions
  • Intelligence Gathering
  • Threat Modeling
  • Vulnerability Analysis
  • Exploitation
  • Post Exploitation
  • Reporting

Now,

The OSSTMM is used to obtain security metrics and performing penetration testing .The OSSTMM provides transparency to those who have inadequate security policies and configurations.

The OSSTMM includes the entire risk assessment process starting from requirement analysis to report creation.

Six areas are covered by OSSTMM which are:

  • Information security
  • Process security
  • Internet technology security
  • Communications security
  • Wireless security
  • Physical security
7 0
2 years ago
You have verified that all your wireless settings are correct. What is most likely the problem if your laptop has recently been
alukav5142 [94]

Answer:

D) The antenna connector is not connected properly

Explanation:

The antenna of a laptop is inside the laptop and it is the antenna that gives access to wireless connection.Since the laptop has just been serviced, the antenna connector could have been inadvertently disconnected hence the antenna would not be able to function and wireless connectivity would not work.

8 0
2 years ago
In cell M2, enter a formula using a nested IF function as follows to determine first if a student has already been elected to of
aleksley [76]

Answer:

Following are the code to this question:

code:

=IF(EXACT(I2,"Yes"),"Elected",IF(EXACT(K2,"Yes"),"Yes","No"))

Explanation:

In the given the data is not defined so we explain only  the above code, but before that, we briefly define working of if the function that can be defined as follows:

  • The If() function, is used only when one of the logical functions and its value must return the value true. or we can say it only return a true value.
  • In the above function, a column "Elected" is used that uses other column values to check this column value is equal if this condition is true it will return "yes" value.

8 0
2 years ago
RADIAC instruments that operate on the ionization principle are broken down into three main categories based on what?
mash [69]

Answer:

Electrical potential.

Explanation:

RADIAC Meter or instruments ( also known as radiation monitoring instruments) are measuring instruments that uses the principles of gaseous ionisation to conduct electricity flow internally to deflect the pointer for its Meter readings. These instruments can be analogue or digital.

They are used in industries to monitor the operation of certain equipments and processes. The level of electrical potential flow in the system determines the state or category of the instrument. Out of six, there are three main categories of electrical potential level.

6 0
2 years ago
Other questions:
  • how do you make a circuit so 1 switch will turn on/off all the lights(3 lights) and a second switch will change the lights from
    14·2 answers
  • Currently, there are two major techniques used to develop programs and their procedures. name and describe them. html editor key
    11·1 answer
  • Static packet filtering firewalls are limited to ________. inspecting packets for which there are good application proxy filteri
    8·1 answer
  • Using basic programming (for loops, while loops, and if statements), write two MATLAB functions, both taking as input:
    6·1 answer
  • Print "userNum1 is negative." if userNum1 is less than O. End with newline Convert userNum2 to 0 if userNum2 is greater than 8.
    10·1 answer
  • NOTE: in mathematics, division by zero is undefined. So, in C++, division by zero is always an error. Given a int variable named
    9·1 answer
  • How can a signature be added to an email message? Check all that apply.
    10·2 answers
  • Write a program that reads students’ names followed by their test scores. The program should output each student’s name followed
    13·1 answer
  • If a class has member variables that are pointers, you must ensure that you implement ____.
    6·1 answer
  • If productCost and productPrice are numeric variables, and productName is a string variable, which of the following statements a
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!