Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

The National Information Assurance Certification and Accreditation Process (NIACAP) is the minimum standard process for the certification and accreditation of computer and telecommunications systems that handle U.S. national security information. What are the different types of NIACAP accreditation Each correct answer represents a complete solution. Choose all that apply.

A.

Type accreditation

B.

Site accreditation

C.

System accreditation

D.

Secure accreditation

Part of your change management plan details what should happen in the change control system for your project. Theresa, a junior project manager, asks what the configuration management activities are for scope changes. You tell her that all of the following are valid configuration management activities except for which one

A.

Configuration Item Costing

B.

Configuration Identification

C.

Configuration Verification and Auditing

D.

Configuration Status Accounting

Which of the following individuals reviews and approves project deliverables from a QA perspective

A.

Information systems security engineer

B.

System owner

C.

Quality assurance manager

D.

Project manager

You work as an ISSE for BlueWell Inc. You want to break down user roles, processes, and information until ambiguity is reduced to a satisfactory degree. Which of the following tools will help you to perform the above task

A.

PERT Chart

B.

Gantt Chart

C.

Functional Flow Block Diagram

D.

Information Management Model (IMM)

The Information System Security Officer (ISSO) and Information System Security Engineer (ISSE) play the role of a supporter and advisor, respectively. Which of the following statements are true about ISSO and ISSE Each correct answer represents a complete solution. Choose all that apply.

A.

An ISSE manages the security of the information system that is slated for Certification & Accreditation (C&A).

B.

An ISSE provides advice on the impacts of system changes.

C.

An ISSE provides advice on the continuous monitoring of the information system.

D.

An ISSO manages the security of the information system that is slated for Certification & Accreditation (C&A).

E.

An ISSO takes part in the development activities that are required to implement system changes.

Which of the following is NOT used in the practice of Information Assurance (IA) to define assurance requirements

A.

Classic information security model

B.

Five Pillars model

C.

Communications Management Plan

D.

Parkerian Hexad

Which of the CNSS policies describes the national policy on certification and accreditation of national security telecommunications and information systems

A.

NSTISSP No. 7

B.

NSTISSP No. 11

C.

NSTISSP No. 6

D.

NSTISSP No. 101

Which of the following DoD policies provides assistance on how to implement policy, assign responsibilities, and prescribe procedures for applying integrated, layered protection of the DoD information systems and networks

A.

DoD 8500.1 Information Assurance (IA)

B.

DoDI 5200.40

C.

DoD 8510.1-M DITSCAP

D.

DoD 8500.2 Information Assurance Implementation

Which of the following refers to a process that is used for implementing information security

A.

Classic information security model

B.

Certification and Accreditation (C&A)

C.

Information Assurance (IA)

D.

Five Pillars model

Which of the following documents is defined as a source document, which is most useful for the ISSE when classifying the needed security functionality

A.

Information Protection Policy (IPP)

B.

IMM

C.

System Security Context

D.

CONOPS