what guidance identifies federal information security controls?

Answers

Answer 1

Answer:

FIPS Publication 200, the second of the mandatory security standards, specifies minimum security requirements for information and information systems supporting the executive agencies of the federal government and a risk-based process for selecting the security controls necessary to satisfy the minimum security..

Explanation:

Hope it helps you..

Your welcome in advance..

(ㆁωㆁ)

Answer 2

The guidance identifies federal information security controls is THE PRIVACY ACT OF 1974.

What is Personally Identifiable statistics?

Personally Identifiable statistics (PII) is any statistics approximately a person maintained with the aid of using an organization, inclusive of statistics that may be used to differentiate or hint a person's identification like name, social safety number, date and region of birth, mother's maiden name, or biometric records.

The Privacy Act states the guidelines that a federal enterprise need to observe to collect, use, transfer, and expose a person's PII.

Read more about the security :

https://brainly.com/question/26260220

#SPJ2


Related Questions

A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. She can access the network from her usual office, but today, she is trying to access the wireless network from a conference room, which is across the hall and next to the elevator. Which of the following is the MOST likely cause of her connectivity problem?

a. The user has not yet rebooted her laptop computer while at her new location.
b. The user needs a new IP address because she is working on a different floor.
c. The wireless network access point on the user's normal floor has failed.
d. The user is out of the effective range of the wireless access point on her floor.
e. The user has not yet logged off and back on to the network while at her new location.

Answers

Answer:

d. The user is out of the effective range of the wireless access point on her floor.

Explanation:

the first fully 64 bit compatible version of android is:

Answers

Answer:

Android 5.0 Lollipop, I hope this helped.

Answer:

The version of the first 64 bit andriod ia the version called: Andriod 5.0 lolipop

Hope this help please give the brainliest award.

Difference between batabse and database management system

Answers

Answer:A database is an organized collection of structured information, or data, typically stored electronically in a computer system. A database is usually controlled by a database management system (DBMS). ... The data can then be easily accessed, managed, modified, updated, controlled, and organized.

Explanation:A database could be grades that students get at school and to manage it we can use a spreadsheet program like excel

what safety do you need to have ready to start a device repair?

Answers

Answer:

Make sure to have the right tools for the right job. if you don't it would be probably best to send it to a shop to get fixed.

1. Define the term Intranet.
2. List three advantages of the intranet.
3. List three disadvantages of the intranet.
4. Briefly define the term extranet. 2marks
5. List three advantages of the extranet.
6. List two disadvantages of the extranet.

Answers

Answer:

1.a local or restricted communications network, especially a private network created using World Wide Web software.

2.Enhanced employee engagement.

Increased productivity.

Better connection and collaboration of distributed employees.

Streamlined communication of change management.

Establishing and reinforcing a strong company culture.

Efficient time management.

3.Costly and timely implementation. Intranet can be very costly and time-consuming to implement.

Complexity and heavy admin burden.  

Poor user experience.  

Low user adoption.  

Time-consuming information search.  

Internal use only.  

Lack of employee advocacy.  

Hard to measure success and effectiveness.

4.An extranet is a private network that enterprises use to provide trusted third parties -- such as suppliers, vendors, partners, customers and other businesses -- secure, controlled access to business information or operations.

5.Information sharing is simple. Without a client extranet, you're likely sharing files with outside parties via email.  

Documents are safe and secure.  

Project management is easy.  

Setup and training require little to no IT involvement.  

Professional branding makes a great impression.

6.Cost. It is no doubt that extranet involves direct expenses such as hardwares, softwares and training of employees.  

Maintenance. Both extranet implementation and maintenance is made expensive within an organization.  

Dependency.  

System Protection.  

Communication Delay.  

User Friendliness.

Explanation:

Consider the plain text ALLTHEBEST with key values 4,19,3,2,3,4,12,5,11,4 what will be the cipher text after applying vigenere cipher.

Answers

hi bae systems applied to the relationship

Easy Question I will make you brainless Just answer this 10 question!!.​

Answers

Answer:

Utility knife - basket

Old newspaper - basket

Strong scissor-Sc

Clean soda can-Sc

Stapler - B

Scissor-basket

Push pin - Sc

Masking tape - Sc

Pin black-Sc

Glue-basket

What refers to the place you drag and drop blocks to create instructions in Scratch?

A.
playground

B.
sprite

C.
editor

D.
environment

Answers

Answer:

It is called the editor script area, hence the name is where you create and edit code.

Hope this help please give the brainliest award.

how to install windows 11 on unsupported processor

Answers

Answer: You can't, if you anyway bypass the system, your device will run on risk.

Suggestion: Use any Linux distro similar windows 11. Like - Ubuntu/ Linux Mint/ ElementaryOs.

(Suggestion is only for if you can't run windows 10 or the pre installed Operating System in your machine.)

Can someone check my answers?
I got 4 for c and 17 for d​

Answers

Answer:

both are correct

Explanation:

write down the steps to start computer.​

Answers

Answer:

To start a Desktop PC:

Ensure the PC is plugged in.  

Press the power button.  

Let the computer start.

When prompted, insert the password if you have one set.  

To start a laptop:

Press the power button.

Let the laptop start.

When prompted, insert the password if you have one set.

n (m,n) correlating branch predictor uses the behavior of the most recent m executed branches to choose from 2m predictors, each of which is an n- bit predictor. A two-level local predictor works in a similar fashion, but only keeps track of the past behavior of each individual branch to predict future behavior.There is a design trade-off involved with such predictors: correlating predictors require little memory for history, which allows them to maintain 2-bit predictors for a large number of individual branches (reducing the probability of branch instructions reusing the same predictor), while local predictors require substan- tially more memory to keep history and are thus limited to tracking a relatively small number of branch instructions. For this exercise, consider a (1,2) correlating predictor that can track four branches (requiring 16 bits) versus a (1,2) local pre- dictor that can track two branches using the same amount of memory. For the fol- lowing branch outcomes, provide each prediction, the table entry used to make the prediction, any updates to the table as a result of the prediction, and the final mis- prediction rate of each predictor. Assume that all branches up to this point have been taken. Initialize each predictor to the following:

Answers

Answer:

a

Explanation:

You have a 7 GHz dual core processor. How many decisions can the processor

make in one second? *


PLEASE HELP 10 points

Answers

The unit that you're asking about (GHz) refers to the frequency.
Frequency is the reciprocal of time.
This means that it gives the measure of work done per unit time.
For example, suppose you can throw two apples in one second then the frequency of your throw is 2Hz or 2Hertz.

what are the seven phases of design plans that the main features of designer-client communication at each phase

Answers

Answer:

Step 1 – Study the Client Brief. ...

Step 2 – Research, Research, Research. ...

Step 3 – Brainstorm. ...

Step 4 – Sketch. ...

Step 5 – Concept Development. ...

Step 6 – Revisions. ...

Step 7 – Completion.

Explanation:

the superclass javax.servlet.http.httpservlet was not found on the java build path

Answers

Answer:

follow this link https://stackoverflow.com/questions/22756153/the-superclass-javax-servlet-http-httpservlet-was-not-found-on-the-java-build

Explanation:

nice

what does a exponent do in excel ?​

Answers

Answer:

Exponents in Excel are one of the oldest concepts in Mathematics and are a very powerful one as you have to deal with powers. They are basically a shorthand notation for repetition or to depict how many times a number is getting multiplied to itself.

Explanation:

what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?

Answers

Answer:

Image result for what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?

Common applications of X. 509 certificates include SSL/TLS and HTTPS for authenticated and encrypted web browsing, signed and encrypted email via the S/MIME protocol, code signing, document signing, client authentication, and government-issued electronic ID.

Explanation:

Which options are available in the Conditional Formatting dialog box?

Answers

Answer:

all but b are correct.

Explanation:

what does your dns server might be unavailable mean?

Answers

Answer:

flush your dns

Explanation:

a researcher is interested in assessing risk-taking

Answers

Answer:

Risk-taking is a dangerous behavior

Explanation:

Knowing this he /she should take the proper safety measures

based on mla guidelines, what is the correct margin width?

Answers

Answer:

Leave 1 inch margins on each side.

how do spear phishing attacks differ from standard phishing attacks?

Answers

Answer:

Phishing attacks normally target random people on mass amount by sending emails to users. In the other hand the spear phishing only targets 1 person hence the name "spear".

Hope this help please give the brainliest award.

which email attachments are generally safe to open

Answers

Answer:

i would suggest not opening ones that start with bit . ly

Explanation:

pls mark brainliest

Anything starting in https://

Which of the following are advantages of using meaningful names for variables when writing a program? Select two answers.
1. Less variables will be required as the existing ones can be renamed throughout the program.
2. It is easier for a person reading the code to identify the purpose of a variable and follow the logic of the program.
3. It is simpler for the compiler to compile the program, meaning wait times and errors are reduced.
4. The programmer is less likely to make a mistake and use a variable for the wrong purpose.

Answers

Answer:

The answer is 2 and 4, please give brainliest award.

Why is the Game Design Document called a ""living"" document AND why is this important?

Answers

Answer:

documentation

Explanation:

Because it gives the instructions rules and every detail about the game with anything in the real world with computers documentation is extremly important  

What language do programmers use to communicate with a computer?

Input code
Linguistic code
Programming code
Virtual code

Answers

Answer:

I would say programming code

Explanation:

Since its a system of rules written in a particular programming language

The language that programmers use to communicate with a computer is called "Programming code".

The correct option is C.

Programming code is the language that is used by developers to create software programs, applications, and websites. These languages are based on a set of instructions that tell the computer what to do.

Programming languages can be divided into two categories: low-level and high-level.

Low-level languages are closer to the binary code that computers use to execute instructions.

High-level languages are more abstract and easier for humans to understand and use.

Examples of high-level languages include Python, Java, JavaScript, and C++.

Programmers use programming languages to create algorithms and procedures that the computer can follow to complete tasks. This involves writing code that is syntactically correct and logically sound. Once the code is written, it must be compiled or interpreted by the computer so that it can be executed.

Know more about programming language,

https://brainly.com/question/23959041

#SPJ3

Match the letter with the corresponding Workspace Area

Options :

-workspace settings

-options bar

-menu bar

-toolbar

Answers

The workspace areas described are editing tools of the photoshop program

The options described below are part of the Adobe Photoshop program for image and photo editing.

Workspace settings: It is a bar to configure the general aspects of the workspace in which an image is going to be edited or created.

Options bar: It is a bar located in the upper part (second row) of the document in which we have different options depending on the tool of the toolbar that we choose.

Menu bar: It is the bar located at the top (first row) in which we find different options such as:

FileEditionImageCapTextSelectionFilter3DViewWindowHelp

Toolbar: It is the bar located on the left side of the screen where we find different editing tools for our file, such as:

MoveMagnetic loopTrimDropperBrushDraftDegradedFeather

Note: This question is incomplete because the information is incomplete. However, I can answer based on my previous knowledge.

Learn more in: https://brainly.com/question/24964958

Complete the sentence.
A(n)
A. Accessibility document
B. User manual
C. Code library
D. Version control document keeps track of the version numbers of an app and what changes were made váth each
version

Answers

Answer: D Version control document

Explanation: right on cs

A version control document keeps track of the version numbers of an application and what changes were made in each version.

What is version control?

Version control can be defined as a process through which changes to a document, file, application and software codes over time, are tracked, recorded and managed, especially for easy recall and modification of specific versions in the future.

In Computer technology, an example of a version control system that is commonly used by software developers across the world is Git.

Read more on version control here: https://brainly.com/question/22938019

#SPJ2

I will make you brainless Just answer this question!!!!

A. Arrange the follow stpes chronologically.Write A the first step,Bfor the second and so on...​

Answers

Answer:

6, 8,5,3,4,1,9,2,7

Explanation:

Just like that

Answer:

6, 8, 1, 3, 4, 2, 9, 5, 7

what level of system and network is required for cui

Answers

Answer:

CUI will be classified at a “moderate” confidentiality level and follow DoDI 8500.01 and 8510.01 in all DOD systems. Non-DoD systems must provide adequate security with requirements incorporated into all legal documents with non-DoD entities following DoDI 8582.01 guideline

Explanation:

Other Questions
A moderately active man weighing 175 pounds should consume no more than 687 calories per day from fat sources. If fat contains 9 calories per gram, what is the maximum number of grams of fat he should consume? Give me a whole number or decimal rounded to one decimal place. Thanks! Expert only please. In a triple batch of a spice mix, there are 6 teaspoons of garlic powder and 15 teaspoons of salt. If the are 14 teaspoons of spice mix, how much sat is in it? Select the statement that is true. A. DNA has the sugar deoxyribose, while RNA has the sugar riboseB. Thymine is only present in DNA, while cytosine is only present in RNA C. DNA and RNA are both double-strandedD. Translation copies DNA to mRNA, while transcription coverts mRNA into proteins Which statement correctly matches the sub-population of finches to the island where it is best adapted? Determine the coordinates of A(2,3) after a reflection in the line y=2 Anybody who is very good at social studies?Answer ASAP sdsscivil techonology PLEASE HELP ME!!!!!We, the people of the Choctaw Nation, having a right to establish our own form of Government, not inconsistent with the Constitution, Treaties and Laws of the United States: by our Representatives, assembled in Convention at Nanihwaiya on Thursday the tenth day of November, 1842, in order to establish Justice, insure Tranquility, promote the general Welfare, and secure to ourselves and our Posterity the right of Life, Liberty and Property: We mutually agree with each other to form for ourselves a free and independent Government.And we do hereby recognize the boundaries assigned the Choctaw Nation by the second article of the treaty made and concluded with the United States of America at Dancing Rabbit Creek on the 27th day of September 1830: viz. beginning near Fort Smith where the Arkansas boundary crosses the Arkansas River, running thence to the source of the Canadian Fork, if in the limits of the United States, or to those limits, thence due South to Red River, thence down Red River to the western boundary of the State of Arkansas, thence North along that line to the beginning: the boundary of the same to be agreeable to the Treaty made and concluded at Washington City in the year 1825.What is the main purpose of the preamble of the 1842 Choctaw Constitution? a plant measures 0.5 in. at the end of week 1 and 14 in. at the end of week 5 how can you tell that a website is valid and reliable?A. Make sure it sounds valid and reliable when you read it?B. Use the CARS checklistC. If it is written using scholarly terms, then it must be written by an expertD. if there are no grammar or spelling errors then it probably is good moraine lake is a glacially fed, turquoise body of water found where? The movement depicted in this poster contributed to the growth of Populismby:O A. encouraging sharecroppers to move west.B. organizing farmers into a political faction.C. encouraging the agricultural economy to diversify.D. lobbying Congress for higher food-safety standards. I am super confused about my stats homework. Every time I get the question wrong, it gives me a new set of numbers. Help! PLEASE HELP ASAPPPPPPPPPPPPPPPPPPP The expression shown is equivalent to A:-4wB:-4WyC:9WD:9W A ball is thrown at a speed of 40m/s. If the ball has a mass of 0.33kg, what is the balls momentum? how does the author establish a tense mood in "the lottery" What were some of their hardships in r obstacles that Martin Luther king jr had in their life? In your own words 2. An apartment complex has a demand given by p = -5x + 860,where x is the number of apartments rented and p is the pricefor each apartment, in dollars. The cost of maintaining thecomplex is $120 per rented apartment. There are fixed costs of$6000.a) Find the revenue equation.b) Find the cost equation.c) Find the profit equation.d) Find the number of apartments that must be rented to breakeven. -Iff(x) = x - 5andg(x) = 4x 2-Findf(g(x)) = 4x [?]-