The document ____ provides a systems developmental lifecycle approach to security assessment of information systems.

A. SP 800-53 A, Jul 2008: Guide for Assessing the Security Controls in Federal Information Systems: Building Effective Security Assessment Plans
B. SP 800-53 Rev. 3: Recommended Security Controls for Federal Information Systems and Organizations
C. SP 800-41 Rev. 1: Guidelines on Firewalls and Firewall Policy
D. SP 800-14: Generally Accepted Principles and Practices for Securing Information Technology Systems


Answer: A

Computer Science & Information Technology

You might also like to view...

____ overlays are used to divide a Web page into columns, margins, spaces between objects, and so forth.

A. Grid B. Style sheet C. Tablet D. Object

Computer Science & Information Technology

RAID level _______ requires three or more hard drives because one drive always contains parity data used to rebuild a failed drive

Fill in the blank(s) with correct word

Computer Science & Information Technology

Case 1Selecting a Web hosting provider can be overwhelming.  Roxanne is responsible for choosing the Web hosting provider for her company, and she wants to make sure the provider and service package meet the company's needs.According to guidelines outlined in the Unit, Roxanne should not choose a Web hosting provider that has less than ____ uptime.

A. 80% B. 90% C. 95% D. 99%

Computer Science & Information Technology

Compacting a database rearranges the data and objects in a database to decrease its file size. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology