Which of the following acts is used to recognize the importance of information security to the
economic and national security interests of the United States?
You have been tasked with finding an encryption methodology that will encrypt most types of email
attachments. The requirements are that your solution must use the RSA algorithm. Which of the
following is your best choice?
In 2003, NIST developed a new Certification & Accreditation (C&A) guideline known as FIPS 199.
What levels of potential impact are defined by FIPS 199? Each correct answer represents a complete
solution. Choose all that apply.