1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oliga [24]
3 years ago
11

DOD Wireless devices must (at minimum) adhere to ____________ encryption requirements?

Computers and Technology
2 answers:
sladkih [1.3K]3 years ago
8 0
<h2>Answer:</h2>

DOD Wireless devices must stick to <u>FIPS</u> encryption.

<h2>Explanation:</h2>

According to United States Government, all the wireless devices must adhere to FIPS "(Federal Information Processing Standards)" encryption system. It is five-digit code that uniquely identifies United States Counties, geographic areas. It sets the minimum strength level for data encryption.

Encryption is used as a key to keep the sensitive data protected from illegal access. It is the benchmark that is used in the validation of Cryptographic hardware. It is used to protect sensitive data for security purposes.  

gogolik [260]3 years ago
4 0

DOD Wireless devices must (at minimum)  adhere to FIPS encryption  requirements,  FIPS stands for the Federal Information Processing Standard.  FIPS PUB 140-2 (full name) is a security standard set for digital devices and computers by the US government.  It is a computer security standard used to approve cryptographic<span> modules.</span>

You might be interested in
Why do organizations create multiple databases?
igomit [66]
Just in case one database gets hacked or crashes they have another to run on
5 0
4 years ago
Within the seven domains of a typical IT infrastructure, there are particular roles responsible for data handling and data quali
nikitadnepr [17]

Answer:

The answer is "auditors"

Explanation:

Description to this question can be described as follows:

  • Auditors are professionals who analyze business and corporate accounts to determine, that the financial reports are accurate and lawful. It will serve as a consultant to suggest possible measures for risk avoidance or cost reduction.
  • Data security is the mechanism to avoid theft, loss of sensitive information, and information quality is critical and it is not able to know or stay in contact with your clients without high-quality data, that's why auditors are the correct answer and other choices can't be defined in the following senior.
7 0
4 years ago
A chord is made up of three or more
kolbaska11 [484]

Answer:

tones

Explanation:

A triad is a tone made up of three tones

7 0
3 years ago
The options are
san4es73 [151]
Medicare Tax, Cause your providing options with no question attached. So i'm just giving my input of which im most concerned about.
5 0
3 years ago
Can someone write the answers pls :(?
emmasim [6.3K]

Answer:

A:  job sharing.

B: part-time working.

C:  flexible hours.

D:  compressed hours.

A: Payroll workers, Typing pool workers, Car production workers, Checkout operators, Bank workers

B: Website designers, Computer programmers, Delivery drivers in retail stores, Computer maintenance staff, Robot maintenance staff.

3: Can lead to unhealthy eating due to dependency on ready meals, Can lead to laziness, Lack of fitness/exercise, Manual household skills are lost.

4: Microprocessor controlled devices do much of the housework, Do not need to do many things manually, Do not need to be in the house when food is cooking, Do not need to be in the house when clothes are being washed, Can leave their home to go shopping/work at any time of the day, Greater social interaction/more family time, More time to go out/more leisure time/more time to do other things/work, Are able to do other leisure activities when convenient to them, Can encourage a healthy lifestyle because of smart fridges analysing food constituents, Do not have to leave home to get fit

Explanation:

I tried really hard to solve these. I hope this answers your questions. can you make me the brainliest, that all I ask since I answered it for you. Pleasure solving these. C:

4 0
3 years ago
Other questions:
  • Which computer tools allow you to communicate with coworkers, family,and friends
    8·1 answer
  • Can you share a google Docx. with a person who has an Icloud Email?
    11·1 answer
  • You need to test a condition and then execute one set of statements if the condition is true. If the condition is false, you nee
    9·1 answer
  • The rules that determine what is allowed in a program are known as the
    14·1 answer
  • If a drastic change in environmental conditions results in a prolonged drought, how would the total population of ferns be affec
    14·2 answers
  • Pressing the _____ key when entering title text in a placeholder creates a new paragraph. BACKSPACE SHIFT DELETE ENTER
    5·1 answer
  • What is the best way to prevent the most common cause of network failure?
    8·2 answers
  • Ask what are brainly points for besides asking questions.
    9·1 answer
  • Unscramble the following words and write them correctly in the
    6·1 answer
  • What are the special features of fifth generation that makes it different from the other generations?​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!