This topic contains a solution. Click here to go to the answer

Author Question: The _________ controls focus on the response to a security breach, by warning of violations or ... (Read 80 times)

LaDunn

  • Hero Member
  • *****
  • Posts: 526
The _________ controls focus on the response to a security breach, by warning of violations or attempted violations of security policies
 
  or the identified exploit of a vulnerability and by providing means to restore the resulting lost computing resources.
  What will be an ideal response?

Question 2

Which of the following is not considered a strategic uses of IT in business?
 
  A)
 
  business-to-employee
  B)
 
  business-to-government
  C)
 
  business-to-customer
  D)
 
  business-to-business



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

mcabuhat

  • Sr. Member
  • ****
  • Posts: 344
Answer to Question 1

detection and recovery

Answer to Question 2

B




LaDunn

  • Member
  • Posts: 526
Reply 2 on: Jul 7, 2018
Great answer, keep it coming :)


carlsona147

  • Member
  • Posts: 341
Reply 3 on: Yesterday
YES! Correct, THANKS for helping me on my review

 

Did you know?

There are approximately 3 million unintended pregnancies in the United States each year.

Did you know?

The ratio of hydrogen atoms to oxygen in water (H2O) is 2:1.

Did you know?

Persons who overdose with cardiac glycosides have a better chance of overall survival if they can survive the first 24 hours after the overdose.

Did you know?

More than 34,000 trademarked medication names and more than 10,000 generic medication names are in use in the United States.

Did you know?

Ether was used widely for surgeries but became less popular because of its flammability and its tendency to cause vomiting. In England, it was quickly replaced by chloroform, but this agent caused many deaths and lost popularity.

For a complete list of videos, visit our video library