CAP Test Q's Flashcards
These are the example test questions
Best security practice requires that personnel implementing changes to production systems should…
- be the same personnel who develop the change.
- not be the same personnel who develop the change
- not be the primary system administrators responsible for the system being changed.
- implement the change at a random time to present attacks when a systems security controls are known to be turned off.
not be the same personnel who develop the change
The monitoring of security controls applies to which System Development Life Cycle (SDLC) phases?
Initiation; development/acquisition; implementation; operations and maintenance; and disposal
An organization utilizes a commercial service provider for pickup and offsite storage of backup media. The information system owner of one of the organization’s information systems has established backup data encryption and media marking procedures prior to backup media pickup by the commercial service provider. This is an example of:
compensating controls.
Which of he following defines National Security Systems?
Section 3541 Title 44 U.S.C. Federal Information Security Management Act of 2002 (FISMA).
The results of the security categorization process will MOST influence the
selection of appropriate security controls
Which of the following must b documented and implemented according to the United States Office of Management and Budget (OMB)?
United States Government Configuration Baseline (USGCB)
Which Risk Management Framework (RMF) step determines the extent to which security controls are implemented correctly, operating as intended and producing the desire result with respect to meeting security requirements?
Assess Security Controls
An organization-wide incident response plan is established which requires that all information system incidents are reported to the organization’s incident response team. The policy also establishes that the incident response team is responsible for all follow-up investigation and reporting. Incident response security controls have been developed, implemented, assessed, and authorized in an organization-wide information system security plan. An information system security plan for an information system in this organization will identify the incident response controls as
common
When the level of trust in the external provider of a subsystem is below expectations, the organization should do which of the following?
Employ Compensating control and accept a greater degree of risk.
The Risk Management Framework (RMF) and associated RMF tasks apply to
both information systems and common controls
What individual within your organization can make an executive decisions in determining whether risk is acceptable?
Authorizing Official (AO)
An information system is currently in the initiation phase of the system Development Life Cycle (SDLC) and has been categorized high impact. The information system owner wants to inherit common controls provided by another organizational information system that is protected for the information system?
Supplement the common controls with system-specific or hybrid controls to achieve the required protection for the system.
Which of the following documents describes the relationship between the Risk Management Framework (RMF) steps and the security authorization process?
NIST SP 800-37
Common control identification occurs in what phase of the Risk Management Framework (RMF) and System Development Life Cycle (SDLC)?
Select and Initiation
Results from a security control assessment require remediation actions. Who among the following is responsible to take the remedial actions?
Information System Owner (ISO)
When contracting for services to process or store a federal organization’s information, the information system used by the contractor to process or store federal information must…
be registered in the organization’s information system inventory and treated in an identical manner as a federal owned and operated system.
After residual risks identified during the security control assessment have been evaluated and prior to a security authorization decision, the Authorizing Official (AO) or designated representative makes a final risk determination based on input obtained DIRECTLY from the following individuals?
Risk executive, Information System Owner (ISO) and Common Control Provider
What is the last step before an information system is placed into operation?
Acceptance of risk by Authorizing Official (AO)
The purpose of the security assessment plan is to:
establish expectations for the security control assessment
An effective continuous monitoring program can be used to
support the FISMA requirement for annual assessment of the security controls in information systems.
The unauthorized modification or destruction of information is a loss of
integrity
The level of effort required to ensure appropriate security for a particular information system depends upon the:
Security categorization of the information system.
Which of the following is an example of a common control being inherited?
- Specialized training used for a firearms tracking system
- A custom authentication system used for an accounting system
- A webserver’s SSL certificate used exclusively for a major web application
- Physical security at a datacenter hosting several applications and systems
Physical security at a datacenter hosting several applications and systems.
When selecting security controls, which NIST Special Publication provides recommended security controls for federal information systems?
- NIST SP 800-199
- NIST SP 800-12
- NIST SP 800-53
- NIST SP 800-34
NIST SP 800-53
According to the Office of Management and Budget (OMB) a Plan of Action and Milestones (POAM) must contain
the type of weakness, the office or organization responsible for the weakness, estimated resources, scheduled completion date, key milestones, milestone changes, the source of discovery for the weakness and the present status.
According to NIST SP 800-37A “Guide for applying the Risk Management Framework to Federal Information Systems”, “determine the risk to organizational operations (including missions, functions, image, or reputation), organizational assets, individuals, other organizations, or the Nation” is the description for…
Risk Determination
What is the last required step before an information system is placed into operation?
Explicit acceptance of risk by the authorizing official.
The security authorization package contains which of the following documents?
- Security Assessment Report (SAR), security audit logs and security plan
- Security Assessment Report (SAR), security plan and Plan of Action and Milestones (POAM)
- Security Assessment Report (SAR), security audit logs and Plan of Action Milestones (POAM)
- security audit logs, security plan and Plan of Action Milestones (POAM)
Security Assessment Report (SAR), security plan and Plan of Action and Milestones (POAM)