Using the high water mark rule, how would an information system with two low impact category security objectives and one high impact security objective be classified?
A. Low impact
B. Moderate impact
C. High impact
D. Medium impact
Answer: C
You might also like to view...
Which of the following is a protocol used by bridges to allow multiple physical paths to exist between them?
a. spanning tree b. source routing c. source routing transparent d. all of the above
When the user presses Enter in a JPasswordField, the GUI component generates an , which is processed by an object that implements the interface .
a. ActionEvent, ActionListener. b. ActionEvent, ActionEventListener. c. TextEvent, TextListener. d. TextEvent, TextEventListener.
Combining multiple objects into one object is known as ________
Fill in the blank(s) with correct word
Let A = {5, 6, 7, 8, 9} and let set B = {x| x is a natural number greater than 8}. Determine whether the following is true or false.
Answer the following statement true (T) or false (F)