Answer:
D
Step-by-step explanation:
It allows for federal agencies to develop, document, and implement an information security and protection program.
3.5m questions
4.5m answers