1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
a_sh-v [17]
3 years ago
12

Which document contains the dod cyber regulations for cui and cti??

Computers and Technology
1 answer:
ivolga24 [154]3 years ago
7 0
<span>The question above has multiple answers you can choose from;

a. DFAS
b. FR-CI
c. DFARS
d. AR 25-2

The answer is (C) DFARS

On October 4, 2016, the Department of Defense issued a rule finalizing cyber reporting regulations. This rule was applicable to Department of Defense contractors and subcontractors. Notably, the final rule clarifies by CDI (covered defense information). This term is used in the DFARS (Defense Federal Acquisition Regulation Supplement). It defines CDI to include 4 categories; covered technical information (CTI); controlled unclassified information (CUI); operations security; export controlled information; and any other information identified or otherwise marked in the contract.</span>
You might be interested in
Jessica has a balance of $2,200 on her credit card with an 18% interest rate. Her credit card company doesn’t require a minimum
professor190 [17]
By doing 2200/18 you get 122 which is how many times you can have 18 go into 2200 and its also how long it will take in days to get her balance doubled.
3 0
4 years ago
A _______________ is a particular type of network that uses circuits that run over the Internet but that appears to the user to
ArbitrLikvidat [17]

Answer:

A virtual privte network is a particular type of network that uses circuits that run over the Internet but that appears to the user to be a private network.

5 0
2 years ago
The IP address is a _____ bit number.
Anika [276]

Answer: 32 bit number

Explanation:

 The IP address basically contain 32 bit number as due to the growth of the various internet application and depletion of the IPV4 address. The IP address basically provide two main function is that:

  • The location addressing
  • The network interface identification  

The IP address are basically available in the human readable format. The IPV6 is the new version of the IP address and its uses 128 bits.  

3 0
3 years ago
When saving a memo you created in Word, which one of the following extensions is automatically assigned to the document?
VMariaS [17]
What are the options and if it's meaning like when you save something it has .pdf .jpg or .doc after the title then it would be ".doc"
8 0
3 years ago
What are the vertical areas of the spreadsheet?
stepladder [879]

Answer:

Columns

Explanation:

A spreadsheet may a explained as a tabular arrangement or arrays of cells which allows users to enter both numeric and string data for storage, manipulation and analysis. The spreadsheet program has both the vertical and horizontal cell arrangement with the vertical areas being reffered to as THE COLUMN which are labeled using alphabets arranged from A - AZ, AA - AZ, and so on to make up a total of 16384 columns on the Microsoft Excel spreadsheet program. Cells are located using a combination of column and row address. With row representing the horizontal area of the spreadsheet and labeled with digits. Therefore cells are usually refereed to as A1, (column A row 1) and so on.

7 0
3 years ago
Other questions:
  • What human activity would cause a decrease in the population of another species? (The action of humans would impact one species,
    9·1 answer
  • The adjustable contact of a potentiometer is placed at the center of its adjustment. If the total resistance is 5 kOhms, what is
    9·1 answer
  • 12. Good digital citizenship includes keeping in mind who has access to the internet and who does not. (1 point)
    15·2 answers
  • Which of the following could be a constructor for the public class MyClass? a. public MyClass() b. public void MyClass() c. publ
    7·1 answer
  • Ineeedd help please 35 points question
    5·1 answer
  • Hello Answerers it would be great if you could answer this:
    12·2 answers
  • What department is cyber security
    6·2 answers
  • Write a method that returns a String that is just the first and last character of the given string Your return value should be o
    8·1 answer
  • KAPWING Video Editing Software allows you to use existing You Tube Videos in your design.
    8·1 answer
  • Direction: Write True on the line if the statement is correct. Write False if the statement is incorrect. 1. All objects are com
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!