Which of the following is the first step in NIST’s recommended steps to establish or improve a cybersecurity program?

A) Create a current profile
B) Prioritize and scope
C) Create a target profile
D) Conduct a risk assessment


B) Prioritize and scope

Computer Science & Information Technology

You might also like to view...

If you type a __________ name and press enter, MS-DOS will execute the commands in sequence.

a. program b. macro c. batch file d. none of the above

Computer Science & Information Technology

Suppose int i = 5, which of the following can be used as an index for array double[] t = new double[100]?

a. i b. (int)(Math.random() * 100)) c. i + 10 d. i + 6.5 e. Math.random() * 100

Computer Science & Information Technology

Which Drop Shadow layer style option controls the lighting applied to the layer?

A. Spread B. Distance C. Angle D. Size

Computer Science & Information Technology

Why is it important to have a well-defined policy, especially when investigators and forensics examiners are involved??

What will be an ideal response?

Computer Science & Information Technology