1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erastovalidia [21]
3 years ago
13

The 10 IISSCC _____ cover 17 NIST control _____ which are arranged in three _____ called management, operational, and technical.

a. domains, families, classesb. principles, domains, familiesc. domains, families, technologiesd. technologies, domains, familiese. controls, domains, principles
Computers and Technology
2 answers:
almond37 [142]3 years ago
7 0

Answer:

Controls, families, domain

Explanation:

ISSCC means international information systems security certification consortium.

They are also known as ISC square, they offer two security certification the cissp and sccp.

Lina20 [59]3 years ago
3 0

Answer: A. Domains, Families, and Classes.

Explanation:

NIST stands for the National Institute of Standards and Technology. NIST works with the US Commerce Department and their role is basically to support new inventions in Science and Technology by ensuring recognized standards are adhered to. The NIST has about 17 families. They are found in the special publication 800-53 and they were developed as part of a national effort to curb cybercrime. Some of them are; Access Control, Audit, and Accountability, Awareness and Training, Configuration Management, etc.

IISSCC stands for International Information Systems Security Certification Consortium. The IISSCC has 10 domains that must be given full and adequate attention when being considered as a measure to tackle security problems. Some of the domains are; Access Control Systems and Methodology, Telecommunications, and Network Security, Business Continuity Planning and Disaster Recovery Planning, etc.

Management, Operational, and Technical are classes into which the Controls are divided.

You might be interested in
Stateful packet inspection firewalls ________. always do application content filtering have the slow speed of relay operation Bo
Evgesh-ka [11]

Answer:

Neither always do application content filtering nor have the slow speed of relay operation.

Explanation:Stateful packet inspection is a dynamic firewall filtering which filters the inflow and outflow of packets of Information from time to time. It is also known to act as monitor for the state of a connection in a Network system. The filtering decisions of a stateful inspection firewall is based on two facts

(1) The rules defined by the administrator

(2) The previous context developed based on the filtering that taken place before.

6 0
3 years ago
Which of the following statements are true about the Internet?
Arlecino [84]
1, 2, and 3 are true
6 0
3 years ago
What kind of job is NOT at greater risk for workplace violence?
natta225 [31]
Well this isnt a computer and technology question ut ill still answer it... youve got being an IT person, Working at build- a-bear, laundry mat, babysitter, there is many different ones
4 0
3 years ago
Which of the following statements is false?
igor_vitrenko [27]
The last one is false.
7 0
3 years ago
Read 2 more answers
Write a main function that declares an array of 100 ints. Fill the array with random values between 1 and 100.Calculate the aver
const2013 [10]

Answer:

#include <stdio.h>

int main()

{

   int avg = 0;

   int sum =0;

   int x=0;

   /* Array- declaration – length 4*/

   int num[4];

   /* We are using a for loop to traverse through the array

    * while storing the entered values in the array

    */

   for (x=0; x<4;x++)

   {

       printf("Enter number %d \n", (x+1));

       scanf("%d", &num[x]);

   }

   for (x=0; x<4;x++)

   {

       sum = sum+num[x];

   }

   avg = sum/4;

   printf("Average of entered number is: %d", avg);

   return 0;

}

4 0
3 years ago
Other questions:
  • An Open Authorization (OAuth) access token would have a _____ that tells what the third party app has access to
    5·1 answer
  • Questions 6 - 9 Refer to the following code: public class WhatsIt { private int[] values; private double average; public WhatsIt
    7·1 answer
  • How can we get the number of records or rows in a table using MySQL? *
    8·1 answer
  • In the CIA Triad, "Confidentiality" means ensuring that data is
    9·1 answer
  • g c 24-hour time (also known in the U.S. as military time) is widely used around the world. Time is expressed as hours since mid
    7·1 answer
  • How do you understand a scientific problem? Give two (2) examples of a scientific problem you
    10·1 answer
  • 50 POINTS PLEASE HELP MEEEEEEEEE!!!!!!
    6·2 answers
  • Write a flowchart and program that does the following: Asks the user for the average temperature in each of the last 12 months A
    12·1 answer
  • Write a static generic method PairUtil.minmax that computes the minimum and maximum elements of an array of type T and returns a
    7·1 answer
  • Tim is a project manager. He is brainstorming with his team about problems that could arise during the next phase of the project
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!