Name a compliance standard that is not a federal regulation.

a. FISMA
b. FERPA
c. PCI DSS


c. PCI DSS

Computer Science & Information Technology

You might also like to view...

Application-level firewalls

a. examine the data itself to determine if it should be allowed into a network b. can only filter for a particular application based on destination address c. can only filter for a particular application based on source address d. none of the above

Computer Science & Information Technology

As programs enter the system, they are placed on a queue. When space becomes available, the __________ selects a program from the queue and loads it into memory.

a. queuing routine b. scheduler c. dispatcher d. command processor

Computer Science & Information Technology

In a SQL injection attack, attackers may use lookup commands to obtain unauthorized information.

True False

Computer Science & Information Technology

Which of the following comparison operators represents "not equal to" in C++?

A. B.

Computer Science & Information Technology