This is a dedicated watch page for a single video.
Requiring FIPS 140-2 compliance, an organization needs to understand the security levels defined by this standard. Which of the following BEST describes how FIPS 140-2 security levels are structured?