Which of the following types of cryptography defined by FIPS 185 describes a cryptographic
algorithm or a tool accepted by the National Security Agency for protecting sensitive, unclassified
information in the systems as stated in Section 2315 of Title 10, United States Code?
Della works as a security engineer for BlueWell Inc. She wants to establish configuration
management and control procedures that will document proposed or actual changes to the
information system. Which of the following phases of NIST SP 800-37 C&A methodology will define
the above task?