1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erastovalidia [21]
3 years ago
13

The 10 IISSCC _____ cover 17 NIST control _____ which are arranged in three _____ called management, operational, and technical.

a. domains, families, classesb. principles, domains, familiesc. domains, families, technologiesd. technologies, domains, familiese. controls, domains, principles
Computers and Technology
2 answers:
almond37 [142]3 years ago
7 0

Answer:

Controls, families, domain

Explanation:

ISSCC means international information systems security certification consortium.

They are also known as ISC square, they offer two security certification the cissp and sccp.

Lina20 [59]3 years ago
3 0

Answer: A. Domains, Families, and Classes.

Explanation:

NIST stands for the National Institute of Standards and Technology. NIST works with the US Commerce Department and their role is basically to support new inventions in Science and Technology by ensuring recognized standards are adhered to. The NIST has about 17 families. They are found in the special publication 800-53 and they were developed as part of a national effort to curb cybercrime. Some of them are; Access Control, Audit, and Accountability, Awareness and Training, Configuration Management, etc.

IISSCC stands for International Information Systems Security Certification Consortium. The IISSCC has 10 domains that must be given full and adequate attention when being considered as a measure to tackle security problems. Some of the domains are; Access Control Systems and Methodology, Telecommunications, and Network Security, Business Continuity Planning and Disaster Recovery Planning, etc.

Management, Operational, and Technical are classes into which the Controls are divided.

You might be interested in
What commonly predefined alias is configured to run the ls âl command?
coldgirl [10]
<span>The l</span><span>l command is the commonly predefined alias that is configured to run the ls âl command. The command ls stands for list. So instead of writing list, in Linux you only write the command ls.
The alias are </span>shortcuts and time-savers. By typing ll we'll get the current directory's listing, in long format, including hidden directories.


6 0
4 years ago
On the seventh day of the iteration, the team realizes that they will not complete 5 of the 13 stories. the product owner says s
nika2105 [10]

Answer:

First of all the team should excuse to the product owner for not being responsible and committed to the deadline.

Secondly, as they have completed the 8 stories, so they should revise and check the flaws in those stories and send to her.

Because when the product owner will check and happy with them, she will surely discuss the remaining stories with the team.

6 0
4 years ago
Is a MODEM required for Internet Connectivity ?<br> Yes<br> No
Pie

Answer:

you can connect to the wifi on your device it will say you are connected but the wifi will not be connected to the internet so you will be able to do nothing on it without the modem

Explanation:

4 0
3 years ago
Read 2 more answers
According to the Center for 21st Century Skills, critical thinking ability includes all of the following skills, EXCEPT ______.
Readme [11.4K]

Answer:

communicate clearly

Explanation:

4 0
3 years ago
The advent of mobile systems run by Android and other operating systems opens a wide range of new system management and security
sergeinik [125]

Answer:

bring your own devices

Explanation:

"bring your own devices" paradigm is getting popular since organizations are increasingly allowing users to perform work tasks <em>on their own</em> personal devices, It is preferred because of the benefits and ease for the user. On the other hand, this paradigm opens several security risks.

For example processing sensitive data on personal devices creates risks in case of data recovery or if the device is stolen or lost.  

Additionally, <em>control and monitoring</em> of organizational data is harder when users allowed to work on their personal devices. Thus <em>data leakage</em> and <em>public exposure</em> can happen more easily.

7 0
3 years ago
Other questions:
  • True or false. Every word has only one correct spelling and pronunciation.
    6·1 answer
  • Data mining is defined as: a)Separating data and programs such that each can be changed without changing the other b)Allowing ma
    5·1 answer
  • How can you create the first row of the table as the header of the table?
    14·2 answers
  • python A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate around the sun
    15·2 answers
  • which of these describe raw data?check all of the boxes that apply A) what a person buys B) where a person lives C) data that ha
    9·1 answer
  • A cache has been designed such that it has 512 lines, with each line or block containing 8 words. Identify the line number, tag,
    7·1 answer
  • Is a biometric system an input, output, storage or soft device?​
    6·1 answer
  • It is important to know the terms of use of any website because why
    12·2 answers
  • Output each floating-point value with two digits after the decimal point, which can be achieved by executing cout &lt;&lt; fixed
    7·1 answer
  • You are a librarian! Ask the user for the last names of the authors of the five books they are returning. Print a list of those
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!