The ____ are the foundation of a security framework.
A. spheres of security
B. NIST documents
C. layered implementations of security
D. CIA triads
Answer: A
Computer Science & Information Technology
You might also like to view...
The ________ is a temporary storage area that holds text or graphics that you select and then cut or copy
Fill in the blank(s) with correct word
Computer Science & Information Technology
Which of the following would an administrator MOST likely require in order to connect a client to a WPA encrypted network?
A. Pre-shared key B. Gateway address C. PIN D. DSA public key E. SSID
Computer Science & Information Technology