Finals Lesson 2 Part 1 Flashcards

1
Q

This position is responsible for ensuring that the IAP is developed and implemented in accordance with regulatory and business requirements. The _____ plays a crucial role in allocating resources and fostering commitment to the IAP.

A

Chief Executive Officer (CEO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In support of the IAP, the ______ ensures that the CIO and CISO positions are filled and appoints an Authorizing Official (AO) and Information System Owner (ISO) for each information system.

A

Chief Executive Officer (CEO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The ______ is responsible for the execution of overall IT program and delegate authority to the CISO for the management of the IAP.

A

Chief Information Officer (CIO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The ______ is the focal point for IT management and governance of IT portfolios and is responsible for:
* Ensuring information security management processes are integrated with strategic and operational planning processes.
* Ensuring trained personnel sufficient to assist in complying with the information assurance requirements in related legislation, policies, directives, instructions, standards, and guidelines.
* Coordinating with senior management to report annually to the head of the federal agency on the overall effectiveness of IAP, including progress of remedial actions.

A

Chief Information Officer (CIO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The ______ carries out the CIO’s security and privacy responsibilities under FISMA and is responsible for managing the IAP.

A

Chief Information Security Officer (CISO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The _______ must:

(i) possess professional qualifications, including training and experience, required to administer the IAP functions;
(ii) maintain information assurance duties as a primary responsibility; and
(iii) head an office with the mission and resources to assist the organization in achieving more secure information and information systems in accordance with FISMA (Federal Information Security Management Act) and Privacy Act requirements.

A

CISO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The ______ is responsible for:

  • Developing an organization-wide IAP that provides adequate security for all information and information systems.
  • Centralized reporting of information security-related activities.
  • Developing and maintaining information security and privacy policies.
  • Defining specific security requirements, tools, templates, and checklists to support the IAP.
  • Ensuring that personnel with significant system security responsibilities are adequately trained.
A

CISO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The ______ is responsible for:

  • Assisting senior management concerning their security responsibilities.
  • Ensuring the implementation of information privacy and security protections as required by the Privacy Act, FISMA, and memoranda.
  • Monitoring security incidents and providing assistance when required.
  • Managing the Office of Information and Technology (OIT) audits and program reviews and supporting Office of the Inspector General (OIG) investigations.
  • Reporting to the CIO and other senior management on the effectiveness of IAP and developing and submitting the annual FISMA report.
A

CISO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The _______ is appointed by the CEO and is granted the authority to formally assume responsibility for operating an information system at an acceptable level of risk.

A

Authorizing Official (AO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The _____ has budgetary oversight for an information system and is responsible for the mission/business operations supported by the system. They approve systems security plans (SSPs), memorandums of agreement or understanding (MOA/MOU), and plans of action and milestones (POA&Ms).

A

Authorizing Official (AO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False:
AOs can deny authorization to operate an information system or if the system is operational, halt operations, if unacceptable risks exist. It is possible that a particular information system may involve multiple AOs. If so, agreements are established among the AOs and documented in the SSP.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The ______ is responsible for:
* Ensuring the security posture of the Agency’s information systems is maintained.
* Reviewing security status reports and security documents and determining if the risk to the Agency of operating the system remains acceptable.
* Reauthorizing information systems when required.
* Assisting in response to security incidents and privacy breaches.
* Appointing, when required, a designated representative to coordinate and carry out system security responsibilities

A

AO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The _______ is appointed by the CEO and serves as the focal point for the information system and is the central point of contact during the security authorization process.

A

Information System Owner (ISO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The ______ is responsible for:
* Coordinating data protection requirements with Information Owners (IOs) that have information stored and processed in the system.
* Deciding, in coordination with the IO and Information System Security Officer
(ISSO), who has access to the system. Determining access privileges and rights to the system.
* Ensuring that system users and support personnel receive the required security training
(e.g., instruction in the Rules of Behavior).
* Ensuring that the system is compliant with the required security controls.

A

Information System Owner (ISO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The ______ is responsible for:
* Appointing an ISSO for the information system to carry out the day-to-day security responsibilities.
* Reviewing system security documents (e.g., SSP, POA&M, etc.).
* Ensuring that system-specific security training is provided to the users and administrators of the systems.
* Ensuring that remediation activities for the system are performed as needed to maintain the authorization status.
* Appointing an Information System Security Manager (ISSM) to coordinate system security task and provide oversight responsibilities to ensure security activities are performed.

A

ISO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The ______ is an official with regulatory, management, or operational authority for specified information and is responsible for establishing the policies and procedures governing its generation, collection, processing, dissemination, and disposal.

A

Information Owner (IO)

17
Q

The _____ is responsible for:
- Providing input to ISOs regarding the security requirements and controls for the systems where the information is processed, stored, or transmitted.
- Retaining information in accordance with the National Archives and Records Administration (NARA) record schedule.

A

IO

18
Q

The _____ is responsible for:
* Categorizing the sensitivity level5 of the information stored and processed in the system.
* Establishing rules for appropriate use and protection of the information.
* Coordinating with the ISO when security requirements change.
* Assisting in the response to security incidents.
* Ensuring that the PII inventory is updated.

A

IO

19
Q

The ______ is appointed by the ISO and works closely with the ISO or ISSM to ensure that the appropriate security posture is maintained for the information system.

A

Information System Security Officer (ISSO)

20
Q

The ______ serves as a principal advisor on all the security related issues of an information system.

A

The ISSO serves as a principal advisor on all the security related issues of an information system.

21
Q

The _____ must have the detailed knowledge and expertise required to manage the security aspects of an information system and is responsible for the day-to-day security operations of a system.

A

ISSO

22
Q

This _______ supports activities at the system level and includes, but is not limited to, physical and environmental protection, personnel security, incident handling, and security training and awareness.

A

ISSO

23
Q

The ______ is responsible for:
* Ensuring system compliance with security policies and procedures.
* Managing and controlling changes to the system.
* Assessing the security impact of any changes.
* Monitoring the system and its environment.
* Developing and updating the SSP.

A

ISSO

24
Q

The _____ is responsible for:
* Coordinating with and supporting the ISO with security responsibilities.
* Preparing or overseeing the preparation of system security documents7 and security activities.
* Developing security policies and procedures that are consistent with IA policies.

A

ISSO

25
Q

The ______ is responsible for:
* Performing or overseeing remediation activities to maintain the authorization status.
* Assisting the ISO assemble the security authorization package for submission to the AO.
* Assisting in the investigation of security incidents.

A

ISSO

26
Q

The ______ serves as the primary liaison for the CISO to individuals with security and privacy responsibilities and supports activities at the IAP level.

A

Information Assurance Manager (IAM)

27
Q

The ______ serves as the primary liaison for the CISO to individuals with security and privacy responsibilities and supports activities at the IAP level.

A

IAM

28
Q

The ______ (Federal employee) coordinates system security task and provide oversight responsibilities to ensure security activities are performed and serves as the liaison between the Information System Security Officer (ISSO) and the Information System Owner (ISO).

A

Information System Security Manager (ISSM)

29
Q

The ______ (contractor) coordinates directly with the ISSM for all system security related issues.

A

ISSO

30
Q

The ______ is responsible for:

  • Providing oversight of system security activities performed by the ISSO.
  • Acting as the liaison between the IAM and the ISSO.
  • Monitoring system compliance with Information Assurance policies and federal guidance.
A

ISSM

31
Q

The _______ is nominated by the Agency and assists the Contracting Officer (CO) by performing the following functions:

  • Acting as a technical liaison between the CO and the contractor.
  • Providing technical assistance.
  • Performing onboarding and off boarding activities for the contractors assigned to the contract.
  • Ensuring that contractors have the proper background investigations before accessing information or systems.
  • Ensuring that contractors properly maintain information and information systems in accordance with the IAP.
A

Contracting Officer’s Representative (COR)

32
Q

The _____ conducts assessments of the security controls employed within or inherited by an information system to determine the overall effectiveness of the controls (i.e., the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system).

A

Security Assessment Team (SAT)

33
Q

The _______ is responsible for:

  • Developing a security assessment plan for each subset of security controls that will be assessed.
  • Submitting the security assessment plan for approval prior to conducting the assessment.
  • Conducting the assessment of security controls as defined in the security assessment plan.
A

SAT

34
Q

The _______ is responsible for:
* Providing an assessment of the severity of weaknesses or deficiencies discovered in the information system.
* Recommending corrective actions to address identified vulnerabilities.
* Preparing the final security assessment report containing the results and findings from the assessment

A

SAT

35
Q

Enumerate the 11 positions:

A

CEO
CIO
CISO
AO
ISO
IO
ISSO
IAM
ISSM
COR
SAT