Which of the following NIST publications focuses on cybersecurity practices and guidelines?

A) Special Publication 1800 series
B) FIPS
C) ITL bulletins
D) NIST Internal or Interagency reports


A) Special Publication 1800 series

Computer Science & Information Technology

You might also like to view...

Write a method that takes in an arbitrary number of String objects, and then prints out all of them that have over 10 characters.

What will be an ideal response?

Computer Science & Information Technology

A small circuit board, called a(n) _____, is required to record and play music, narration, and sound effects.

A. video card B. sound card C. audio control card D. motherboard

Computer Science & Information Technology

A _____ attack is designed to generate a lot of activity on a network by flooding it with useless traffic-enough traffic to overwhelm the network's processing capability and essentially bring all communications to a halt.

A. rampage B. mass-mailing C. denial of service D. stampede

Computer Science & Information Technology

You launch an Amazon EC2 instance without an assigned AVVS identity and Access Management (IAM) role. Later, you decide that the instance should be running with an IAM role. Which action must you take in order to have a running Amazon EC2 instance with an IAM role assigned to it?

A. Create an image of the instance, and register the image with an IAM role assigned and an Amazon EBS volume mapping. B. Create a new IAM role with the same permissions as an existing IAM role, and assign it to the running instance. C. Create an image of the instance, add a new IAM role with the same permissions as the desired IAM role, and deregister the image with the new role assigned. D. Create an image of the instance, and use this image to launch a new instance with the desired IAM role assigned.

Computer Science & Information Technology