1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Taya2010 [7]
1 year ago
14

What action should you take if you become aware that sensitive compartmented information has been compromised

Computers and Technology
1 answer:
irina [24]1 year ago
5 0

The sensitive compartmented information can not be compromised and in case found with the incident it must be reported to the security officer.

<h3>What is Sensitive Compartmented Information?</h3>

The sensitive compartmented information is given as the sensitive information to the United States gathered with the source of the intelligence and the analytical process.

The information has been sensitive and was considered not to be compromised. In case the information is found to be compromised, the security officer of the information must be contacted to check into the details.

Learn more about sensitive information, here:

brainly.com/question/25948574

#SPJ1

You might be interested in
The themes gallery is located on the _____ ribbon tab
Mrac [35]
The themes gallery is located on the "design" ribbon tab
6 0
3 years ago
Read 2 more answers
. What is piracy? ???????????????????​
Delicious77 [7]

Answer: a practice similar to piracy but in other contexts, especially hijacking.

"air piracy"

the unauthorized use or reproduction of another's work.

Explanation:

8 0
3 years ago
In 2016, NIST published a new Federal Master Cybersecurity Framework to create a mandatory framework for managing cybersecurity
ICE Princess25 [194]

Answer:

In 2014, NIST published a new Federal Master Cybersecurity Framework for managing cyber risk for the delivery of critical services. So the correct answer is False.

Explanation:

NIST published the Federal Master Cybersecurity Framework to managing risk for the delivery of critical services. The U.S. issued Framework on February 12, 2014.

8 0
2 years ago
The ________ is the agreed-upon interface between all the software that runs on the machine and the hardware that executes it. I
Talja [164]

Answer:

The correct answer to the following question will be "Instruction set architecture".

Explanation:

The Instruction Series Design is a component of the system that is accessible to the compiler and the programmer. It is also the distinction between hardware and software. We will describe in detail the set of instructions used in most of the microprocessors that are used today.

The processor ISA can be represented using 5 categories, these are as follows:

  • The RAM Running Memory.
  • Amount of clear operating names.
  • Location of operands.
  • Operations
  • Size and type of the operand.

Therefore, Instruction set architecture is the right answer.

4 0
2 years ago
Ang Kabihasnang ito ay umusbong sa rehiyon ng Timog Mexico
Westkost [7]

Answer:

nahh I'm still in disbelieve

8 0
3 years ago
Other questions:
  • People who work the total hours for which they get paid have
    7·2 answers
  • Henry uses a laptop and has noticed that sometimes when he is typing, the cursor will move, causing him to mistype words or even
    12·1 answer
  • Which of these is a method of selecting multiple items in Impress or PowerPoint? A. holding down the Ctrl key while clicking ite
    9·2 answers
  • How does emotional awareness help you with non-verbal communication?
    13·2 answers
  • The major objective of this lab is to practice class and object-oriented programming (OOP), and separate files: 1. We will reuse
    5·1 answer
  • one data is in memory the computer interpets and executeinstructions to process the data into informationA. TrueB. False
    8·1 answer
  • What two devices in a computer should be considered "black boxes," and should never be opened due to risks involving charged cap
    6·1 answer
  • I need help. I wanna help a friend by giving him my powerpoint but I dont want him to steal my work. Is their anyway to restrict
    8·1 answer
  • Why is it better for a CPU to have more than one cache?
    6·2 answers
  • Introduce yourself by following the rule
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!