1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
laiz [17]
3 years ago
10

For Official Use Only (FOUO) and Controlled Unclassified Information (CUI) may include all of the following except: (circle one)

a. Secret information b. Personnel information c. Payroll information d. Sensitive information
Computers and Technology
2 answers:
quester [9]3 years ago
7 0

Answer

A. Secret Information

Explanation

For Official Use only is a security information term for designation applied by most governments. In the United States, it is used by the department of defense to handle orders for controlled Unclassified Information (CUI), and is strictly unclassified. The main purpose of this program is to eliminate inefficient and misleading patch work across agencies in the department of defense.


olchik [2.2K]3 years ago
3 0

If it is unclassified than there are no secrets, common sense answer would be A- Secret Information.

If there was secret information on a FOUO than it would not be a FOUO

You might be interested in
Match each command group under Picture Tools to the appropriate tasks.
FrozenT [24]

Answer:

look at the attachment for correct answers.

6 0
3 years ago
Which of the following is generally true about Open Source Software?
JulijaS [17]
<span>Open source software is usually free to download and install, and it can be studied, changed, and distributed according to the rights of the software. I don't believe there is any copyright laws on this type of software. The most known open source software is Linux and it's available for most operating systems right now. Typically, open source owners just ask for donations for their work.</span>
3 0
4 years ago
How do i clear my search history ?
nydimaria [60]
If an iphone go to the open book icon then go to history and clear from there if on a laptop go to the top right and look at the three ... press it and go to history and press clear history I don’t remember about android
4 0
3 years ago
Read 2 more answers
Thomas Hill claims that a fruitful way to think about the badness of destroying the environment is
viktelen [127]
To think about what kind of human would choose to destroy the earth.To appeal to theories about God and care for the earth.To examine people’s intuitions about whether it is right to harmthe environment.To examine the rights that belong to the environment and act on<span>the basis of those rights</span>
3 0
3 years ago
oe, a user, receives an email from a popular video streaming website. the email urges him to renew his membership. the message a
ale4655 [162]

Where Joe, a user, receives an email from a popular video-streaming website and the email urges him to renew his membership. If the message appears official, but Joe has never had a membership before, and if when Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL, note that the security threat that this describes is: "Phishing" (Option B)

<h3>What is Phishing?</h3>

Phishing is a sort of social engineering in which an attacker sends a fake communication in order to fool a person into disclosing sensitive data to the perpetrator or to install harmful software, such as ransomware, on the victim's infrastructure.

To avoid phishing attacks, make sure you:

  • understand what a phishing scheme looks like
  • Please do not click on that link.
  • Get anti-phishing add-ons for free.
  • Don't provide your information to an untrusted website.
  • Regularly change passwords.
  • Don't disregard those updates.
  • Set up firewalls.
  • Don't give in to those pop-ups.

Learn more about Phishing:
brainly.com/question/23021587
#SPJ1

Full Question:

Joe, a user, receives an email from a popular video streaming website. The email urges him to renew his membership. The message appears official, but Joe has never had a membership before. When Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL.

Which of the following security threats does this describe?

  • Trojan
  • Phishing
  • Man-in-the-middle
  • Zero-day attack
5 0
2 years ago
Other questions:
  • A laptop gets replaced if there's a hardware issue. Which stage of the hardware lifecycle does this scenario belong to?
    5·1 answer
  • Exchanging which type of data uses the least bandwidth?
    14·1 answer
  • A computer with a domain name is called a
    8·2 answers
  • Methods used to change variables are called ______. equals accessors toString void mutators
    5·1 answer
  • Infrastructure as a Service (IaaS) replaces the _________ of the computer hierarchy with an Internet-based infrastructure.
    14·1 answer
  • Write a program that takes as input a number of kilometers and prints the corresponding number of nautical miles. Use the follow
    9·1 answer
  • 100BaseT network uses the TCP/IP protocol suite exclusively, and workstations on your network obtain addresses dynamically from
    6·1 answer
  • Select the correct answer.
    8·1 answer
  • Evaluate how suitable the hardware would be for:
    12·1 answer
  • Explain employment opportunities in the networking field 
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!