Which of the following network security standards provides an overview of information security and defines six phases of the IT security life cycle?
A) NIST SP 800-14
B) NIST SP 800-35
C) ISO 27036
D) NIST SP 800-30 Rev. 1
B) NIST SP 800-35
Computer Science & Information Technology
You might also like to view...
The ___________________ algorithm sorts values by repeatedly comparing neighboring elements in the list and swapping their position if they are not in order relative to each other.
a) insertion sort b) selection sort c) bubble sort d) quick sort e) merge sort
Computer Science & Information Technology
When the Save As dialog box is used to create a Word macro-enabled template, that template has an extension of ____.
A. .dotx B. .dotm C. .docx D. all of the above
Computer Science & Information Technology