1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
a_sh-v [17]
3 years ago
12

Which document contains the dod cyber regulations for cui and cti??

Computers and Technology
1 answer:
ivolga24 [154]3 years ago
7 0
<span>The question above has multiple answers you can choose from;

a. DFAS
b. FR-CI
c. DFARS
d. AR 25-2

The answer is (C) DFARS

On October 4, 2016, the Department of Defense issued a rule finalizing cyber reporting regulations. This rule was applicable to Department of Defense contractors and subcontractors. Notably, the final rule clarifies by CDI (covered defense information). This term is used in the DFARS (Defense Federal Acquisition Regulation Supplement). It defines CDI to include 4 categories; covered technical information (CTI); controlled unclassified information (CUI); operations security; export controlled information; and any other information identified or otherwise marked in the contract.</span>
You might be interested in
Organizations should communicate with system users throughout the development of the security program, letting them know that ch
Fed [463]

Answer:

Yes it is true.The organization should indeed communicate with a system user throughout the development of a security program. A corporation needs a security policy that must be developed by management at all levels, including organization and employees at the operational level. For a corporate security plan, it is essential to reduce the resistance of the expected changes and define the objective.

Explanation:

Three objectives of the security plan in an organization are:

  • Identify the sensitive system and plan
  • Create and define the strategy and control of the system.
  • Develop and implement the training programs.

Security Information is one of the essential factors in the organization.For an organization, the information should be protected.

7 0
3 years ago
Which is the order of steps for attaching an item to a contact?
aivan3 [116]
We need to know what item and then we can answer ur question
5 0
4 years ago
Read 2 more answers
Video texted are an example of multimedia because<br>​
Artemon [7]

Explanation:

The name "multimedia" itself tells us that, it involves "multiple types of media".

There are 5 different types of media which comes under multimedia. They are "text, video, audio, graphics, animation".

Text: A plain text

Audio: The musical background or any type of audio

Video: Visuals taken through cameras

Graphics: The use of diagrams in calculation and design

Animation: Moving pictures.

So video texted involves "more than one type of media" so this can be called as "multimedia".

4 0
3 years ago
The ub-04 form would most likely be used in what setting?
wlad13 [49]

The UB-04 form would most likely be used in the following setting:

  • Hospitals
  • Hospices
  • General health centers such as rural clinics.
  • Rehab facilities

The uniform bill (UB-04) form is also referred to as CMS-1450 and it is a standard claim form that is used for billing and submitting Medicare Part A outpatient or inpatient health claims to Medicare fiscal intermediaries such as insurance companies, medical providers (hospitals), etc.

Also, the uniform bill (UB-04) form was introduced by the National Uniform Billing Committee (NUBC) in 2004, so as to replace the UB-92 form.

Generally, UB-92 form is a paper claim form that is typically used for laboratory, radiology, surgery, etc. Thus, the UB-04 form would most likely be used in the following setting:

  • Hospitals
  • Hospices
  • General health centers such as rural clinics.
  • Rehab facilities

Read more on UB-04 form here: brainly.com/question/4437165

4 0
2 years ago
Rint "Censored" if userInput contains the word "darn", else print userInput. End with newline.
Marta_Voda [28]

If you're coding with C++ then the solution would be:

  if (userInput.find("darn") != -1) {

     cout << "Censored" << endl;

  }

  else{

     cout << userInput << endl;

  }

Keep in mind that this will reject any input with the word "darn" in the sentence. This will not filter the word darn if the capitalization is in different formats like "Darn, dArn, daRn, darN, DARN".

7 0
3 years ago
Other questions:
  • A computer’s memory is composed of 8K words of 32 bits each. How many bits are required for memory addressing if the smallest ad
    10·1 answer
  • Can you give me a long list of kid's cartoons
    8·2 answers
  • Preesure is drived quantity? why​
    15·2 answers
  • Which of the following is most likely to be a result of hacking? Group of answer choices slowing of network speed certain Web si
    13·1 answer
  • You’re mapping out the logical relations of a database, and you notice that one of your tables will have a pair of child records
    12·1 answer
  • Political parties to address the interest of civil society<br>​
    7·1 answer
  • Brainliest for correct answer
    13·2 answers
  • Describe your previous personal or professional experience with Microsoft Word.
    9·1 answer
  • What is cloud based LinkedIn Automation?
    12·2 answers
  • Help please match them if you just put a link or say “I don’t know but thanks for the points” I’ll report your answer and you wo
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!