A _________ level breach of security could cause a significant degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is significantly reduced.

A) catastrophic
B) moderate
C) low
D) high


B) moderate

Computer Science & Information Technology

You might also like to view...

Discuss the three goals of normalization.

What will be an ideal response?

Computer Science & Information Technology

With ____ allocation, the amount of storage to be allocated is assigned, as requested, at runtime instead of being fixed at compile time.

A. static B. dynamic C. fixed D. compiler

Computer Science & Information Technology

After you name a cell or range, you can define its ____________________, or the worksheets where you will be able to use it.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Use styles to assign headings and subheadings for a Table of Contents.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology