answersLogoWhite

0


Best Answer

availabilty and integrity

User Avatar

Wiki User

10y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What categories primarily used to establish the MAC requirements?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

MAC categories reflect the importance of information relative to the achievements and objectives of the war fighter. The categories are primarily used to establish the requirements for?

availbility and integrity


These MAC categories reflect the importance of information relative to the achievements and objectives of the war fighter. The categories are primarily used to establish the requirements for?

availbility and integrity


What are DoDD 8500.01E mission categories used to establish requirements for?

DoDD 8500.01E specifies three Mission Assurance Categories.


What is primarily used to establish acceptable methods for individual security clearances background investigations access approvals need to share determinations and interconnection controls and a?

Federal Information Processing Standards (FIPS) is used to establish acceptable methods.


Is primarily used to establish acceptable methods for individual security clearances background investigations access approvals need-to-share determinations and interconnection controls and?

Confidentiality level


What is primarily used to establish acceptable methods for individual security clearances background investigations access approvals need to share determinations and interconnecting controls?

Confidentiality level


What is primarly used to establish acceptable methods for individual security clearances background investigations access approvals need to share determinations and interconnection controls?

Integrity level is primarily used to establish acceptable methods for individual security clearances, background investigations access approvals need to share determinations and interconnection controls.


What is primarily used to establish acceptable methods for individual security clearances background investigate access approvals need-to-share determinations and interconnection controls and approval?

Confidentiality level


Is primarily used to establish acceptable methods for individual security clearances background investigations access approvals need-to-share determinations and interconnecting controls and approvals?

Confidentiality level


Which of the following operating systems is used primarily is used primarily?

The primary


What scale could you measure tornado damage?

There are three scale that can be used. The Fujita Scale (F0 to F5) which was used rotate tornadoes in the United States until 2007 and still is used in other countries such as Canada. The Enhanced Fujita Scale (EF0 to EF5) which uses essentially the same categories as the Fujita scale, only the wind estimates are adjusted and damage analysis is more detailed. It is used primarily in the United States. The TORRO scale (T0 to T11) uses similar damage and wind estimates to the Fujita scale, but has 2 categories for every 1 on the Fujita Scale. It is primarily used in Britain.


What is primarily used to establish acceptable methods for individual security clearances background investigations access approvals need-to-share determinations and interconneciton controls approvals?

Confidentiality level