Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Fill in the blank with an appropriate section name. _________________ is a section of the SEMP template, which specifies the methods and reasoning planned to build the requisite trade-offs between functionality, performance, cost, and risk.

A.

System Analysis

Which of the following organizations is a USG initiative designed to meet the security testing, evaluation, and assessment needs of both information technology (IT) producers and consumers

A.

NSA

B.

NIST

C.

CNSS

D.

NIAP

Fill in the blank with an appropriate phrase. The ______________ process is used for allocating performance and designing the requirements to each function.

A.

functional allocation

Which of the following processes illustrate the study of a technical nature of interest to focused audience, and consist of interim or final reports on work made by NIST for external sponsors, including government and non-government sponsors

A.

Federal Information Processing Standards (FIPS)

B.

Special Publication (SP)

C.

NISTIRs (Internal Reports)

D.

DIACAP

Which of the following approaches can be used to build a security program Each correct answer represents a complete solution. Choose all that apply.

A.

Right-Up Approach

B.

Left-Up Approach

C.

Bottom-Up Approach

D.

Top-Down Approach

Which of the following is used to indicate that the software has met a defined quality level and is ready for mass distribution either by electronic means or by physical media

A.

ATM

B.

RTM

C.

CRO

D.

DAA

Which of the following federal agencies provides a forum for the discussion of policy issues, sets national policy, and promulgates direction, operational procedures, and guidance for the security of national security systems

A.

National Security AgencyCentral Security Service (NSACSS)

B.

National Institute of Standards and Technology (NIST)

C.

United States Congress

D.

Committee on National Security Systems (CNSS)

Della works as a security engineer for BlueWell Inc. She wants to establish configuration management and control procedures that will document proposed or actual changes to the information system. Which of the following phases of NIST SP 800-37 C&A methodology will define the above task

A.

Security Certification

B.

Security Accreditation

C.

Initiation

D.

Continuous Monitoring

Which of the following principles are defined by the IATF model Each correct answer represents a complete solution. Choose all that apply.

A.

The degree to which the security of the system, as it is defined, designed, and implemented, meets the security needs.

B.

The problem space is defined by the customer's mission or business needs.

C.

The systems engineer and information systems security engineer define the solution space, which is driven by the problem space.

D.

Always keep the problem and solution spaces separate.

There are seven risk responses for any project. Which one of the following is a valid risk response for a negative risk event

A.

Acceptance

B.

Enhance

C.

Share

D.

Exploit