answersLogoWhite

0

AFI 31-101 or the bases's own 31-101 supplements.

User Avatar

Norval Lind

Lvl 10
2y ago

What else can I help you with?

Related Questions

What AF publication defines the security requirements for PL 1-4 resources?

AFI 31-101 or the bases's own 31-101 supplements.


Which us law publication and reference paragraph defines hazardous material transportation safety training requirements?

49 CFR, 172.704 (a)(3)


Which three statements accurately describe a security policy?

It creates a basis for legal action if necessary It defines a process for managing security violations. It defines acceptable and unacceptable use of network resources.


Which three statements accurately describe attributes of a security policy?

It creates a basis for legal action if necessary It defines a process for managing security violations It defines acceptable and unacceptable use of network resources


What defines the types of objects that can belong to a particular group and the types of resources that a group can be used to secure?

Security Groups


What is the difference between a share permission and security permission?

A Share permission defines who can access a resource, a security access defines what they can do.


Which US Law publication and reference paragraph defines the Hazardous Material Table?

49 CFR, 172.101


Which IRS publication defines a payroll period as that period of service for which you usually pay wages?

circular D


What does java security do?

Defines the security policy for each application .Every Java Application can have its own Security manager.


Which regulation defines hazmat employee training requirements?

Dod 4500.9-r


Which publication defines ethics as standards by which one should act based on values?

DoD 5500-7R, Joint Ethics Regulation


What defines the types of objects that can belong to a particular group and the types of resources that group can be used to secure?

Group scope defines the types of objects that can belong to a particular group and the types of resources that group can be used to secure.