NIST SP800-53 discusses a set of security controls as what type of security tool?

A. A configuration list
B. A threat management strategy
C. A baseline
D. The CIS standard


Answer: C. A baseline

Computer Science & Information Technology

You might also like to view...

One advantage a linked list has over a vector is that

A) a linked list can dynamically shrink or grow, and a vector cannot. B) a linked list is smaller than a vector. C) insertion and removal of items is faster with lists than with vectors. D) All of the above E) None of the above

Computer Science & Information Technology

Maintaining state refers to storing persistent data about a Web site visit using hidden form fields, query strings, cookies and sessions.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When you use the assignment operator with an array, individual elements are copied to another memory location.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What are objects, such as buttons, menus, and labels, that can display and respond to user interaction, called?

A. controls B. interfaces C. events D. containers

Computer Science & Information Technology