I need a paper on the below question in APA format, All the instructions are provided below

Answer the one question from each assigned section this week (sections 12.1-12.4). Each response should be 1-2 paragraphs in length. Type your numbered answers in a Word document (i.e. Section 12.1 Question 2, etc.). APA formatting is not required. If you use outside sources to support your answers, provide APA-style citations and a reference page.

Answer one of the following from Section 12.1:

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now
  1. Which document allows you to effectively monitor the performance of your system?
  2. Why is it important to conduct a needs assessment?
  3. In the IT asset lifecycle, in which phase would you applying updates and patches?
  4. Why should you test a new asset in a sandbox environment?
  5. What information is needed to create a network diagram?

Answer one of the following from Section 12.2:

  1. Where can you obtain an MSDS if you didn’t receive one with your shipment?
  2. What can you do to ensure the safety of employees and visitors?
  3. What is the difference between a portable and fixed fire suppression systems?
  4. What are the four components that fire needs to burn?
  5. In fire suppression, what is the PASS method?
  6. What is the ideal relative humidity for a room to protect against ESD?

Answer one of the following from Section 12.3:

  1. What is the difference between a threat and a vulnerability?
  2. What is a mission critical system?
  3. What is the difference between a BCP and a BIA?
  4. Which part of risk response can introduce the possibility of negligence and lead to liability?
  5. What is the difference between a tangible and an intangible asset?
  6. What is the difference between quantitative and qualitative analysis?

Answer one of the following from Section 12.4:

  1. What are the characteristics of a strong password?
  2. What information should be included into the privacy policy as personally identifiable information?
  3. What vulnerabilities does a vulnerability scan look for in your network?
  4. Why should you destroy old versions of the security plan?
  5. What is the difference between onboarding and off-boarding?
  6. Which document specifies who is going to do what and when?