1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
a_sh-v [17]
3 years ago
12

Which document contains the dod cyber regulations for cui and cti??

Computers and Technology
1 answer:
ivolga24 [154]3 years ago
7 0
<span>The question above has multiple answers you can choose from;

a. DFAS
b. FR-CI
c. DFARS
d. AR 25-2

The answer is (C) DFARS

On October 4, 2016, the Department of Defense issued a rule finalizing cyber reporting regulations. This rule was applicable to Department of Defense contractors and subcontractors. Notably, the final rule clarifies by CDI (covered defense information). This term is used in the DFARS (Defense Federal Acquisition Regulation Supplement). It defines CDI to include 4 categories; covered technical information (CTI); controlled unclassified information (CUI); operations security; export controlled information; and any other information identified or otherwise marked in the contract.</span>
You might be interested in
Help on What i should say to my IT school lady? Read all three pages
avanturin [10]

Answer:

if you were to rest my would I still be able to have all my stuff that I have done if so I think you could reset it for me

hope this helps

have a good day :)

Explanation:

4 0
3 years ago
What are face shields intended to protect you from? (select best answer?
aivan3 [116]
Well it determends if there wearing them for sports or for fighting 
if it is for sports then they are protected from balls and such
if it is for fighting then they are protected from bullets arrows and anything else you could think of
they are used to shield your face
8 0
3 years ago
Read 2 more answers
What is one problem you should keep in mind when researching information on the Internet?
shepuryov [24]
The answer is A due to the internet being a plethora of information being accessed by anyone and everyone with internet access. Any person of no background to certain information could claim mastery to the field and sway his/her audience to ways possible. Ensuring that the source of the information being read is from credible and reputable companies. You can do this by ensuring the information is from newspapers with names known all over the world or there are also sourced footnotes from the author where they could have cited some information from other articles. 
5 0
3 years ago
Read 2 more answers
To make slides in a powerpoint online application presentation have the same transition effect, select __________ on the transit
Artemon [7]

Answer: Animations

Explanation:

Transitions, such as fade, can be applied to all using the command Ctrl+A.

Transitions are found under the animations Tab. Sorry about the bots.

Hope This Helped!

8 0
2 years ago
Write a method to add/subtract two matrices. The header of the method is as follows:
Sergio [31]

Answer: A

Explanation:

3 0
2 years ago
Other questions:
  • Which of these protects against the most common attacks on the internet via a database of signatures, but at the same time actua
    9·1 answer
  • ___ is the technology used by smart phones to send text messages.
    6·1 answer
  • What are the five layers in the internet protocol stack? What are the principal responsibilities of each of these lay?
    9·1 answer
  • Communications technology and the Internet can be used to reduce the time and costs involved in disseminating financial statemen
    14·1 answer
  • When Gina was 10, she swam in the ocean for the first time. She remembers the feeling of kicking her feet, slicing her arms thro
    12·1 answer
  • A user is attempting to access a shared file locally on their workstation. The file has Full control NTFS permissions assigned,
    14·1 answer
  • What is this car first to awnser is the brianliest
    5·2 answers
  • Task 1: Alex has created the following code using Scratch and expected it to move backwards and forwards across the screen. Howe
    13·1 answer
  • Given the message size of 16Kb, packet size of 2Kb, speed of 4Kbps over 3 links, how much time, will it take the message to trav
    6·1 answer
  • How is video compression accomplished?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!