Which of the following is the last step in NIST’s recommended steps to establish or improve a cybersecurity program?

A) Implement the action plan
B) Orient your strategy
C) Determine, analyze, and prioritize any gaps
D) Create a target profile


A) Implement the action plan

Computer Science & Information Technology

You might also like to view...

A(n) ____ connection is a high-speed, digital, always-on Internet access technology that uses phone lines to transport data.

A. dial-up B. DSL C. ISP D. ISDN

Computer Science & Information Technology

List safety considerations when downloading shareware, freeware, or public-domain software.

What will be an ideal response?

Computer Science & Information Technology

Criteria that can be changed when a query is run is a__________.

a. field name b. parameter c. prompt d. selection

Computer Science & Information Technology

An organization wants to perform maintenance on any of its web servers without affecting the service availability during a scheduled change window. Which of the following network devices would be required to provide this functionality?

A. Router B. Forward proxy C. Load balancer D. Firewall

Computer Science & Information Technology