Which of the following is the last step in NIST’s recommended steps to establish or improve a cybersecurity program?
A) Implement the action plan
B) Orient your strategy
C) Determine, analyze, and prioritize any gaps
D) Create a target profile
A) Implement the action plan
You might also like to view...
A(n) ____ connection is a high-speed, digital, always-on Internet access technology that uses phone lines to transport data.
A. dial-up B. DSL C. ISP D. ISDN
List safety considerations when downloading shareware, freeware, or public-domain software.
What will be an ideal response?
Criteria that can be changed when a query is run is a__________.
a. field name b. parameter c. prompt d. selection
An organization wants to perform maintenance on any of its web servers without affecting the service availability during a scheduled change window. Which of the following network devices would be required to provide this functionality?
A. Router B. Forward proxy C. Load balancer D. Firewall