Practice Test 1 Flashcards
An event or situation that has the potential for causing undesirable consequences or impact.
A. Threat Event
B. Threat Assessment
C. Threat Source
D. Threat Scenario
A. Threat Event
In which type of access control do user ID and password system come under?
A. Administrative
B. Technical
C. Power
D. Physical
B. Technical
The Organization Level (Tier 1) strategy addresses/requires……..
A. Assessment of Risks
Evaluation of Risks
Mitigation of Risks
Acceptance of Risk
Monitoring Risk
Risk Management Strategy Oversight
B. Mitigation of Risks
Acceptance of Risk
Monitoring Risk
Risk Management Strategy Oversight
Assessment of Risks
Evaluation of Risks
C. Acceptance of Risk
Assessment of Risks
Evaluation of Risks
Mitigation of Risks
Monitoring Risk
Risk Management Strategy Oversight
D. Evaluation of Risks
Mitigation of Risks
Acceptance of Risk
Monitoring Risk
Assessment of Risks
Risk Management Strategy Oversight
A. Assessment of Risks
Evaluation of Risks
Mitigation of Risks
Acceptance of Risk
Monitoring Risk
Risk Management Strategy Oversight
Individual, group, organization, or government that conducts or has the intent to conduct detrimental activities.
A. Adversary
B. Enterprise
C. Countermeasures
D. Assurance
A. Adversary
Choose from the following options the U.S. government repository of standards-based vulnerability management data where you can easily find the NIST standards for guidance on continuous monitoring.
A. NIST SP 800-37
B. NVD
C. SCAP
D. ISCM
B. NVD (National Vulnerability Database)
In the case of a complex information system, where a “leveraged authorization” that involves two agencies will be conducted, what is the minimum number of system boundaries/accreditation requirements boundaries that can exist?
A. Only one
B. Only two, because there are two agencies.
C. At least two
D. A leveraged authorization cannot be conducted with more than one agency involved.
A. Only one.
What is the MOST appropriate action to take after weaknesses or deficiencies in controls are corrected?
A. The system is given an Authority to Operate (ATO)
B. The remediated controls are reassessed.
C. The assessment report is generated.
D. The original assessment results are changed.
B. The remediated controls are reassessed.
You are the project manager for GHY Project and are working to create a risk response for a negative risk. You and the project team have identified the risk that the project may not complete on time, as required by the management, due to the creation of the user guide for the software you’re creating. You have elected to hire an external writer in order to satisfy the requirements and to alleviate the risk event. What type of risk response have you elected to use in this instance?
A. Sharing
B. Avoidance
C. Transference
D. Exploiting
C. Transference
Which of the following are the goals of risk management?
Each correct answer represents a complete solution. Choose three.
A. Finding an economic balance between the impact of the risk and the cost of the countermeasure
B. Identifying the risk
C. Assessing the impact of potential threats
D. Identifying the accused
A. Finding an economic balance between the impact of the risk and the cost of the countermeasure
B. Identifying the risk
C. Assessing the impact of potential threats
What would be the impact level due to the loss of CIA that could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, individuals, other organizations or the nation?
A. Low impact level
B. Medium impact level
C. Moderate impact level
D. High impact level
D. High impact level
Which of the following is not an authorization decision identified in the RMF?
A. Authorization to operate
B. Denial of authorization to operate
C. Common control authorization
D. All of the above
D. All of the above
Sensitivity of a system based on the _________ processed, stored, and transmitted by the system.
A. Data
B. Program
C. Image
D. Signal
A. Data
Which of the following terms related to risk management represents the estimated frequency at which a threat is expected to occur?
A. Safeguard
B. Single Loss Expectancy (SLE)
C. Exposure Factor (EF)
D. Annualized Rate of Occurrence (ARO)
D. Annualized Rate of Occurrence (ARO)
Where would you find standard guidance for determining an organization’s risk appetite?
A. NIST SP 800-39
B. NIST SP 800-50
C. NIST SP 800-37
D. NIST SP 800-53
A. NIST SP 800-39
The FISMA defines three security objectives for information and information systems:
A. CONFIDENTIALITY, INTEGRITY and AVAILABILITY
B. INTEGRITY, AVAILABILITY and AUTHENTICITY
C. AVAILABILITY, AUTHENTICITY and CONFIDENTIALITY
D. AUTHENTICITY, CONFIDENTIALITY and INTEGRITY
A. CONFIDENTIALITY, INTEGRITY and AVAILABILITY
Which of the following tasks are identified by the Plan of Action and Milestones document? Each correct answer represents a complete solution. Choose all that apply.
A. The plans that need to be implemented
B. The resources needed to accomplish the elements of the plan
C. Any milestones that are needed in meeting the tasks
D. The tasks that are required to be accomplished
E. Scheduled completion dates for the milestones
B. The resources needed to accomplish the elements of the plan
C. Any milestones that are needed in meeting the tasks
D. The tasks that are required to be accomplished
E. Scheduled completion dates for the milestones
Authentication ensures that system users are who they say they are. At Colvine Tech, a system user must prove identity by providing an email address, a password, and answer a security question before being given logical access.
What factor of authentication fits this requirement?
A. Multi-factor authentication
B. Authentication and accountability
C. Single-factor authentication
D. Dual-factor authentication
C. Single-factor authentication
The ability to quickly adapt and recover from any known or unknown changes to the environment through holistic implementation of risk management, contingency, and continuity planning.
A. Resilience
B. Fragile
C. Inanimate
D. Silence
A. Resilience
A written plan for recovering one or more information systems at an alternate facility in response to a major hardware or software failure or destruction of facilities.
A. Disaster Recovery Plan (DRP)
B. Common Vulnerability Scoring System (CVSS)
C. Continuity of Operations Plan (COOP)
D. Common Vulnerability and Exposures (CVE)
A. Disaster Recovery Plan (DRP)
The loss of confidentiality, integrity, or availability could be expected to have a limited adverse effect, a serious adverse effect, or a severe or catastrophic adverse effect on organizational operations,
organizational assets, or individuals.
A. Potential Impact
B. High Impact
C. Low Impact
D. Moderate Impact
A. Potential Impact
Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?
A. Safeguards
B. Preventive controls
C. Detective controls
D. Corrective controls
D. Corrective controls
The official management decision given by a senior organizational official to authorize operation of an information system and to explicitly accept the risk to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation based on the implementation of an agreed‐upon set of security controls.
A. Authorization (to operate)
B. Systems operated
C. Security Authorization
D. Senior Organizational
A. Authorization (to operate)
Which of the following are the common roles with regard to data in an information classification system program?
Each correct answer represents a complete solution. Choose all that apply.
A. Custodian
B. User
C. Security auditor
D. Editor
E. Owner
A. Custodian
B. User
C. Security auditor
E. Owner
What RMF artifact establishes the scope of protection for an IS and encompass people, process, and info tech that are part of the system?
A. System Boundary
B. Risk Management Framework
C. Authorize
D. Categorization
A. System Boundary