Using the high water mark rule, how would an information system with two low impact category security objectives and one high impact security objective be classified?

A. Low impact
B. Moderate impact
C. High impact
D. Medium impact


Answer: C

Computer Science & Information Technology

You might also like to view...

Which of the following is a protocol used by bridges to allow multiple physical paths to exist between them?

a. spanning tree b. source routing c. source routing transparent d. all of the above

Computer Science & Information Technology

When the user presses Enter in a JPasswordField, the GUI component generates an , which is processed by an object that implements the interface .

a. ActionEvent, ActionListener. b. ActionEvent, ActionEventListener. c. TextEvent, TextListener. d. TextEvent, TextEventListener.

Computer Science & Information Technology

Combining multiple objects into one object is known as ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Let A = {5, 6, 7, 8, 9} and let set B = {x| x is a natural number greater than 8}.  Determine whether the following is true or false.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology