1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mote1985 [20]
3 years ago
14

In order to be compliant with the NIST publications, policies must include key security control requirements. One of these key r

equirements includes certification and accreditation, which is a process that occurs after the system is documented, controls tested, and risk assessment completed. It is required before going live with a major system. Once a system is certified and accredited, responsibility shifts to the owner to operate the system.
A) True
B) False
Computers and Technology
1 answer:
rodikova [14]3 years ago
8 0

Answer:

The answer is "Option A".

Explanation:

A comprehensive collection of principles, guidelines, proposals, and studies on information and information systems privacy and safety are produced and carried out in the NIST publications.

  • The FIPS management standards for federal information and security laws contain various technical reporting sequences.
  • This process takes place after a plan is identified, reviews are carried out and risk analysis is performed.
You might be interested in
What mathematical equation was created by a founder of intel?.
mestny [16]

Arithmetic Logic Unit is said to be mathematical equation was created by a founder of intel.

<h3>What was this Arithmetic Logic Unit about?</h3>

Arithmetic Logic Unit is known to be Part of the CPU that was set up to perform mathematical equations. It is known to act as a passway to and from the processor.

Gordan Moore is known to be the founder of Intel. He is the man who has helped shape the modern world and produce  the base technology root.

Learn more about Arithemetic Logic Unit from

brainly.com/question/26486053

5 0
2 years ago
Which country has the most common features of analogue and digital computer​
ANTONII [103]

Explanation:

i don't think rhis question could be..

4 0
3 years ago
The decryption broker feature is supported by which three Palo Alto networks firewall series
dalvyx [7]

Answer:

See the explanation section

Explanation:

Decryption broker features is supported for the following:

PA-7000 Series devices

PA-5200 Series devices

PA-3200 Series devices

The model supported by the decryption broker features include:

VM-300 model

VM-500 model

VM-700 models.

They usually requires SSL Forward Proxy decryption to be enabled, where the firewall is established as a trusted third party to session traffic.

3 0
2 years ago
Acme Widgets currently uses a 1024-bit RSA encryption standard company wide. The company plans to convert from RSA to an ellipti
nadya68 [22]

Answer:

The answer is "Option A".

Explanation:

The elliptical curve cryptography system needs much shorter keys for cryptography, and it is very powerful because of the RSA cryptography method. It is also known as a key of 1024-bit, which is in comparison is equal to the 160-bit ECC key for cryptographic, that's why other options are not correct, which is defined as follows:

  • In option B,  It is higher the ECC key system, that's why it's wrong.
  • In option C, It is a part of the RSA system but its value doesn't match the ECC system, that's why it is wrong.  
  • In option D, It's valued is just double to the RSA system, that's why it is wrong.

6 0
2 years ago
How do you do this question?
laila [671]

Answer:

(a) 1 to 8

(b) 1 to 6

Explanation:

A "leaf" is a node at the end of a binary tree (in other words, it has no "children").  All other nodes are "non-leaf" nodes.

The smallest number of leaves is 1.  That would be a binary tree that's just a straight line; each node will have only 1 child, until you get to the last node (the leaf).

To find the largest number of leaves, we start drawing a full binary tree.  A complete tree with 15 nodes has 7 non-leaf nodes and 8 leaf nodes.  A full tree with 6 non-leaf nodes can have up to 6 leaf nodes.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Approximately what percent of desktop PCs are used for work-related purposes?
    12·1 answer
  • ¿Ha existido en la historia de nuestra humanidad alguien que hubiera hecho posible el sueño del ser humano en obtener energía li
    11·1 answer
  • An example of an electrical insulator is _____.
    15·1 answer
  • To enter a typed number into a cell, you press Tab or Backspace?​
    7·2 answers
  • Which tool is used to view stars in galaxies far from the Milky Way?
    10·1 answer
  • What is a slide master ?
    8·2 answers
  • Which of the following statements is correct?
    11·1 answer
  • When your friend DaJuan turns on his computer, he hears four beeps. The computer won’t fully boot. DaJuan has a Dell computer wi
    7·1 answer
  • Computers and Technology:
    14·1 answer
  • A collection of wiress connecting the CPU with main memory that is used to identify particular location is called
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!