The document ____ provides a systems developmental lifecycle approach to security assessment of information systems.
A. SP 800-53 A, Jul 2008: Guide for Assessing the Security Controls in Federal Information Systems: Building Effective Security Assessment Plans
B. SP 800-53 Rev. 3: Recommended Security Controls for Federal Information Systems and Organizations
C. SP 800-41 Rev. 1: Guidelines on Firewalls and Firewall Policy
D. SP 800-14: Generally Accepted Principles and Practices for Securing Information Technology Systems
Answer: A
You might also like to view...
____ overlays are used to divide a Web page into columns, margins, spaces between objects, and so forth.
A. Grid B. Style sheet C. Tablet D. Object
RAID level _______ requires three or more hard drives because one drive always contains parity data used to rebuild a failed drive
Fill in the blank(s) with correct word
Case 1Selecting a Web hosting provider can be overwhelming. Roxanne is responsible for choosing the Web hosting provider for her company, and she wants to make sure the provider and service package meet the company's needs.According to guidelines outlined in the Unit, Roxanne should not choose a Web hosting provider that has less than ____ uptime.
A. 80% B. 90% C. 95% D. 99%
Compacting a database rearranges the data and objects in a database to decrease its file size. _________________________
Answer the following statement true (T) or false (F)