Which U.S. law defines security standards exclusively for federal agencies?
A. HIPAA
B. FERPA
C. GLBA
D. FISMA
Answer: D. FISMA
Computer Science & Information Technology
You might also like to view...
What are the four steps to follow to design a good sample?
What will be an ideal response?
Computer Science & Information Technology
A network that does not require the use of a server is called a:
A) virtual private network B) client/server network C) rogue network D) peer-to-peer network
Computer Science & Information Technology
Visit the Web site for Visible Analyst® or another CASE tool, and investigate licensing options. Are network installations limited by the number of workstations, the number of users at any one time, or other constraints? Write a brief report with your findings.
What will be an ideal response?
Computer Science & Information Technology
Define the three possible result types the Performance Analyzer tool might propose
What will be an ideal response?
Computer Science & Information Technology