Which U.S. law defines security standards exclusively for federal agencies?

A. HIPAA
B. FERPA
C. GLBA
D. FISMA


Answer: D. FISMA

Computer Science & Information Technology

You might also like to view...

What are the four steps to follow to design a good sample?

What will be an ideal response?

Computer Science & Information Technology

A network that does not require the use of a server is called a:

A) virtual private network B) client/server network C) rogue network D) peer-to-peer network

Computer Science & Information Technology

Visit the Web site for Visible Analyst® or another CASE tool, and investigate licensing options. Are network installations limited by the number of workstations, the number of users at any one time, or other constraints? Write a brief report with your findings.

What will be an ideal response?

Computer Science & Information Technology

Define the three possible result types the Performance Analyzer tool might propose

What will be an ideal response?

Computer Science & Information Technology