Answer:
True
Explanation:
In order to be compliant with the NIST publications, policies must include key security control requirements. One of these key requirements includes certification and accreditation, which is a process that occurs after the system is documented, controls tested, and risk assessment completed. It is required before going live with a major system. Once a system is certified and accredited, responsibility shifts to the owner to operate the system is a true statement.
Answer:
1G
Explanation:
1 'G' as in first generation.
Hope this helped. :)
Correct question.
Which role is delegated to personnel of the IT department and how is responsible for maintaining the integrity and security of the data?
Answer:
<u>data custodian</u>
<u>Explanation:</u>
Remember, every organization generates data, and large organizations generate even larger data.
Hence, the role of a data custodian in an organization requires He implements measures to protect the organization's data, store and backup the data, as well as granting access to the data to authorized persons when needed.
Answer:
Definition - What does CONFIG. ... SYS is a configuration file on DOS systems. It is a text file that contains the settings and commands to load drives in a DOS system. This is a primary configuration file for OS/2 and DOS OS. This file was introduced in DOS and is replaced for 32-bit Windows versions with CONFIG.
Explanation:
B. A generated report will include all records that a query fetches.