The ____ are the foundation of a security framework.

A. spheres of security
B. NIST documents
C. layered implementations of security
D. CIA triads

Answer: A

Computer Science & Information Technology

You might also like to view...

The ________ is a temporary storage area that holds text or graphics that you select and then cut or copy

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following would an administrator MOST likely require in order to connect a client to a WPA encrypted network?

A. Pre-shared key B. Gateway address C. PIN D. DSA public key E. SSID

Computer Science & Information Technology