Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following Registration Tasks notifies the DAA, Certifier, and User Representative that the system requires C&A Support

A.

Registration Task 4

B.

Registration Task 1

C.

Registration Task 3

D.

Registration Task 2

Which of the following federal laws establishes roles and responsibilities for information security, risk management, testing, and training, and authorizes NIST and NSA to provide guidance for security planning and implementation

A.

Computer Fraud and Abuse Act

B.

Government Information Security Reform Act (GISRA)

C.

Federal Information Security Management Act (FISMA)

D.

Computer Security Act

Which of the following federal agencies has the objective to develop and promote measurement, standards, and technology to enhance productivity, facilitate trade, and improve the quality of life

A.

National Institute of Standards and Technology (NIST)

B.

National Security Agency (NSA)

C.

Committee on National Security Systems (CNSS)

D.

United States Congress

Which of the following DoD policies establishes IA controls for information systems according to the Mission Assurance Categories (MAC) and confidentiality levels

A.

DoD 8500.1 Information Assurance (IA)

B.

DoD 8500.2 Information Assurance Implementation

C.

DoDI 5200.40

D.

DoD 8510.1-M DITSCAP

Which of the following is a type of security management for computers and networks in order to identify security breaches

A.

IPS

B.

IDS

C.

ASA

D.

EAP

Which of the following policies describes the national policy on the secure electronic messaging service

A.

NSTISSP No. 11

B.

NSTISSP No. 7

C.

NSTISSP No. 6

D.

NSTISSP No. 101

Which of the following processes culminates in an agreement between key players that a system in its current configuration and operation provides adequate protection controls

A.

Certification and accreditation (C&A)

B.

Risk Management

C.

Information systems security engineering (ISSE)

D.

Information Assurance (IA)

Which of the following Net-Centric Data Strategy goals are required to increase enterprise and community data over private user and system data Each correct answer represents a complete solution. Choose all that apply.

A.

Understandability

B.

Visibility

C.

Interoperability

D.

Accessibility

Your project has several risks that may cause serious financial impact should they happen. You have studied the risk events and made some potential risk responses for the risk events but management wants you to do more. They'd like for you to create some type of a chart that identified the risk probability and impact with a financial amount for each risk event. What is the likely outcome of creating this type of chart

A.

Risk response plan

B.

Quantitative analysis

C.

Risk response

D.

Contingency reserve

Which of the following roles is also known as the accreditor

A.

Data owner

B.

Chief Information Officer

C.

Chief Risk Officer

D.

Designated Approving Authority