This criteria is satisfied by the implementation if the requirement is met prior to loading Government-supplied software.
This criteria is satisfied by the implementation if the requirement is met prior to loading Government-supplied software.
This criteria is satisfied by the implementation if the requirement is met prior to loading Government-supplied software.
A waiver of the requirement will be granted for six (6) character passwords if requested. Note that a note regarding this waiver will appear on the certificate.
A waiver of the requirement will be granted if requested. Note that a note regarding this waiver will appear on the certificate.
This requirement is satisfied if the supplier provides a utility to
output this information. In many implementations, the historical
The GOTS APM software uses the Diffie-Hellman algorithm for encrypting network traffic within the administrative domain.
This criteria is satisfied by the implementation if the requirement is met prior to loading Government-supplied software.
Contents | Next section |