According to NIST SP 800-14's security principles, security should ________.

A. support the mission of the organization
B. require a comprehensive and integrated approach
C. be cost-effective
D. All of the above


Answer: D

Computer Science & Information Technology

You might also like to view...

____ usually require users to register by supplying a bit of personal information, choosing a user ID, and selecting a password.

A. Web apps B. Copyright terms C. Mobile apps D. Terms of use

Computer Science & Information Technology

What is the first thing that the kernel does when WinLoad turns over the startup process to it?

What will be an ideal response?

Computer Science & Information Technology

Compute the perimeter of a rectangle with a 3-inch base and a 4-inch altitude.

What will be an ideal response?

Computer Science & Information Technology

An example of when a file should not be used is:

a) to save the status of a video game for another session. b) to save the value of a variable at runtime. c) to log errors in the execution of a program. d) these are all good examples of when files should be used.

Computer Science & Information Technology