Which of the following elements of Registration task 4 defines the system's external interfaces as well as the purpose of each external interface, and the relationship between the interface and the system

Which of the following elements of Registration task 4 defines the system's external interfaces as well as the purpose of each external interface, and the relationship between the interface and the systemA . System firmwareB . System softwareC . System interfaceD . System hardwareView AnswerAnswer: C

August 4, 2020 No Comments READ MORE +

Which of the following is designed to detect unwanted attempts at accessing, manipulating, and disabling of computer systems through the Internet

Which of the following is designed to detect unwanted attempts at accessing, manipulating, and disabling of computer systems through the InternetA . DASB . IDSC . ACLD . IpsecView AnswerAnswer: B

August 4, 2020 No Comments READ MORE +

Which of the following configuration management system processes defines which items will be configuration managed, how they are to be identified, and how they are to be documented

Which of the following configuration management system processes defines which items will be configuration managed, how they are to be identified, and how they are to be documentedA . Configuration verification and auditB . Configuration controlC . Configuration status accountingD . Configuration identificationView AnswerAnswer: D

August 4, 2020 No Comments READ MORE +

Which of the following assessment methodologies defines a six-step technical security evaluation

Which of the following assessment methodologies defines a six-step technical security evaluationA . FITSAFB . OCTAVEC . FIPS 102D . DITSCAPView AnswerAnswer: C

August 3, 2020 No Comments READ MORE +

Which of the following cooperative programs carried out by NIST conducts research to advance the nation's technology infrastructure

Which of the following cooperative programs carried out by NIST conducts research to advance the nation's technology infrastructureA . Manufacturing Extension PartnershipB . NIST LaboratoriesC . Baldrige National Quality ProgramD . Advanced Technology ProgramView AnswerAnswer: B

August 3, 2020 No Comments READ MORE +

Which of the following documents were developed by NIST for conducting Certification & Accreditation (C&A) Each correct answer represents a complete solution. Choose all that apply.

Which of the following documents were developed by NIST for conducting Certification & Accreditation (C&A) Each correct answer represents a complete solution. Choose all that apply.A . NIST Special Publication 800-59B . NIST Special Publication 800-60C . NIST Special Publication 800-37AD . NIST Special Publication 800-37E . NIST Special Publication...

August 3, 2020 No Comments READ MORE +

Which of the following professionals plays the role of a monitor and takes part in the organization's configuration management process

Which of the following professionals plays the role of a monitor and takes part in the organization's configuration management processA . Chief Information OfficerB . Authorizing OfficialC . Common Control ProviderD . Senior Agency Information Security OfficerView AnswerAnswer: C

August 3, 2020 No Comments READ MORE +

Which of the following statements are true about ISSO and ISSE Each correct answer represents a complete solution?

The Information System Security Officer (ISSO) and Information System Security Engineer (ISSE) play the role of a supporter and advisor, respectively. Which of the following statements are true about ISSO and ISSE Each correct answer represents a complete solution? Choose all that apply.A . An ISSE manages the security of...

August 2, 2020 No Comments READ MORE +

Which of the following federal laws is designed to protect computer data from theft

Which of the following federal laws is designed to protect computer data from theftA . Federal Information Security Management Act (FISMA)B . Computer Fraud and Abuse Act (CFAA)C . Government Information Security Reform Act (GISRA)D . Computer Security ActView AnswerAnswer: B

August 2, 2020 No Comments READ MORE +

Which of the following Security Control Assessment Tasks evaluates the operational, technical, and the management security controls of the information system using the techniques and measures selected or developed

Which of the following Security Control Assessment Tasks evaluates the operational, technical, and the management security controls of the information system using the techniques and measures selected or developedA . Security Control Assessment Task 3B . Security Control Assessment Task 1C . Security Control Assessment Task 4D . Security Control...

August 2, 2020 No Comments READ MORE +