Della works as a security engineer for BlueWell Inc. She wants to establish configuration
management and control procedures that will document proposed or actual changes to the
information system. Which of the following phases of NIST SP 800-37 C&A methodology will define
the above task?
Which of the following types of cryptography defined by FIPS 185 describes a cryptographic
algorithm or a tool accepted as a Federal Information Processing Standard?