1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
finlep [7]
2 years ago
7

What level of system and network is required for cui

Computers and Technology
1 answer:
galben [10]2 years ago
6 0

Answer:

CUI will be classified at a “moderate” confidentiality level and follow DoDI 8500.01 and 8510.01 in all DOD systems. Non-DoD systems must provide adequate security with requirements incorporated into all legal documents with non-DoD entities following DoDI 8582.01 guideline

Explanation:

You might be interested in
Which of the following behaviors does not harm a company if your employment is terminated?
saul85 [17]

Answer:

D. notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave

Explanation:

Assuming your employment is terminated, notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave is a behavior that would not harm a company. In the true and actual sense, making such suggestions is commendable because it would go a long way to cause more good rather than harm the company.

Some mischievous and malicious employees would rather not tell so they can still have an unauthorized access to the company's account and perpetrate various level of evil.

Hence, it is a good global practice to have a company's login credentials updated whenever an employee's employment is terminated.

3 0
3 years ago
When Lisa purchased her house the mortgage lender required homeowners insurance to cover 100% of the loan amount. After many yea
Black_prince [1.1K]
I think that the  insurance coverage amount should be based on the appraisal value of the house. Appraisal value is an evaluation of the value of property based on a given point in time. This evaluation is done by an appraiser who is chosen by the lender.
3 0
2 years ago
Read 2 more answers
A musical time measurer is a(an)
Radda [10]
A musical timer is a metronome.
3 0
2 years ago
Which of the following is NOT a Boolean Search term used to refine search engine results? A. AND B. With C. OR D. NOT
den301095 [7]
B. With. Width isn't a boolean comparative operator
7 0
3 years ago
Read 2 more answers
The navigation items for a Lightning app are available on mobile: A. In a special mobile configuration in the navigation menu an
mr_godi [17]

Navigation items are used for moving from one part of the part to a destination using actions and also for passing information. The right option is  <em>C. In the navigation menu and the first four items of the </em><em>navigation bar</em><em>, when users are in the app </em>

<em />

There are different methods/ways to implement the Navigation component in a mobile application, we have the following type of Navigation Implementation

  1. Bottom Navigation
  2. Drawer Navigation(Slides from Left to right)
  3. Top Navigation

Learn more about Navigation here:

brainly.com/question/8908486

5 0
2 years ago
Other questions:
  • On the food inventory worksheet, enter a function in cell G1 that counts the number of Food Items. What formula would i use!? Th
    5·1 answer
  • You are holding a rock tied to a string, which is an example of a pendulum. identify and explain the proper term for each part o
    10·2 answers
  • True or false?
    13·1 answer
  • ________ programming is a method of writing software that centers on the actions that take place in a program.
    8·1 answer
  • When would you use the AutoFit to Contents option?
    15·1 answer
  • Design 3 classes: Computer - Superclass
    11·1 answer
  • What are the origins of the parking barrier?
    12·1 answer
  • Pls help
    15·2 answers
  • Cuales son las paginas web​
    12·1 answer
  • You are implementing a new application control solution. Prior to enforcing your application whitelist, you want to monitor user
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!