The document ____ makes recommendations for establishing firewall policies and for selecting, configuring, testing, deploying, and managing firewall solutions.

A. SP 800-53 A, Jul 2008: Guide for Assessing the Security Controls in Federal Information Systems: Building Effective Security Assessment Plans
B. SP 800-53 Rev. 3: Recommended Security Controls for Federal Information Systems and Organizations
C. SP 800-41 Rev. 1: Guidelines on Firewalls and Firewall Policy
D. SP 800-14: Generally Accepted Principles and Practices for Securing Information Technology Systems


Answer: C

Computer Science & Information Technology

You might also like to view...

26. Given a linked list (using the code from the book), which of the following sets of statements would implement a function to return the last item in the list?

a. NodePtr here; here=head; while(here->link != NULL) { here = here ->link; } return here->data; b. NodePtr here; here=head->link; while(here != NULL) { here = here ->link; } return here->data; c. NodePtr here; while(here->link != NULL) { here = here ->link; } return here->data; d. NodePtr here; here=head; while(here->link != NULL) { here = here ->link; }

Computer Science & Information Technology

A random access file is organized most like a(n):

a. Array. b. Object. c. Class. d. Pointer.

Computer Science & Information Technology

The Each...Next statement is used with the debugging process

Indicate whether the statement is true or false

Computer Science & Information Technology

Main memory is the same as the random access memory.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology