Practice Test 1 Flashcards
An event or situation that has the potential for causing undesirable consequences or impact.
A. Threat Event
B. Threat Assessment
C. Threat Source
D. Threat Scenario
A. Threat Event
In which type of access control do user ID and password system come under?
A. Administrative
B. Technical
C. Power
D. Physical
B. Technical
The Organization Level (Tier 1) strategy addresses/requires……..
A. Assessment of Risks
Evaluation of Risks
Mitigation of Risks
Acceptance of Risk
Monitoring Risk
Risk Management Strategy Oversight
B. Mitigation of Risks
Acceptance of Risk
Monitoring Risk
Risk Management Strategy Oversight
Assessment of Risks
Evaluation of Risks
C. Acceptance of Risk
Assessment of Risks
Evaluation of Risks
Mitigation of Risks
Monitoring Risk
Risk Management Strategy Oversight
D. Evaluation of Risks
Mitigation of Risks
Acceptance of Risk
Monitoring Risk
Assessment of Risks
Risk Management Strategy Oversight
A. Assessment of Risks
Evaluation of Risks
Mitigation of Risks
Acceptance of Risk
Monitoring Risk
Risk Management Strategy Oversight
Individual, group, organization, or government that conducts or has the intent to conduct detrimental activities.
A. Adversary
B. Enterprise
C. Countermeasures
D. Assurance
A. Adversary
Choose from the following options the U.S. government repository of standards-based vulnerability management data where you can easily find the NIST standards for guidance on continuous monitoring.
A. NIST SP 800-37
B. NVD
C. SCAP
D. ISCM
B. NVD (National Vulnerability Database)
In the case of a complex information system, where a “leveraged authorization” that involves two agencies will be conducted, what is the minimum number of system boundaries/accreditation requirements boundaries that can exist?
A. Only one
B. Only two, because there are two agencies.
C. At least two
D. A leveraged authorization cannot be conducted with more than one agency involved.
A. Only one.
What is the MOST appropriate action to take after weaknesses or deficiencies in controls are corrected?
A. The system is given an Authority to Operate (ATO)
B. The remediated controls are reassessed.
C. The assessment report is generated.
D. The original assessment results are changed.
B. The remediated controls are reassessed.
You are the project manager for GHY Project and are working to create a risk response for a negative risk. You and the project team have identified the risk that the project may not complete on time, as required by the management, due to the creation of the user guide for the software you’re creating. You have elected to hire an external writer in order to satisfy the requirements and to alleviate the risk event. What type of risk response have you elected to use in this instance?
A. Sharing
B. Avoidance
C. Transference
D. Exploiting
C. Transference
Which of the following are the goals of risk management?
Each correct answer represents a complete solution. Choose three.
A. Finding an economic balance between the impact of the risk and the cost of the countermeasure
B. Identifying the risk
C. Assessing the impact of potential threats
D. Identifying the accused
A. Finding an economic balance between the impact of the risk and the cost of the countermeasure
B. Identifying the risk
C. Assessing the impact of potential threats
What would be the impact level due to the loss of CIA that could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, individuals, other organizations or the nation?
A. Low impact level
B. Medium impact level
C. Moderate impact level
D. High impact level
D. High impact level
Which of the following is not an authorization decision identified in the RMF?
A. Authorization to operate
B. Denial of authorization to operate
C. Common control authorization
D. All of the above
D. All of the above
Sensitivity of a system based on the _________ processed, stored, and transmitted by the system.
A. Data
B. Program
C. Image
D. Signal
A. Data
Which of the following terms related to risk management represents the estimated frequency at which a threat is expected to occur?
A. Safeguard
B. Single Loss Expectancy (SLE)
C. Exposure Factor (EF)
D. Annualized Rate of Occurrence (ARO)
D. Annualized Rate of Occurrence (ARO)
Where would you find standard guidance for determining an organization’s risk appetite?
A. NIST SP 800-39
B. NIST SP 800-50
C. NIST SP 800-37
D. NIST SP 800-53
A. NIST SP 800-39
The FISMA defines three security objectives for information and information systems:
A. CONFIDENTIALITY, INTEGRITY and AVAILABILITY
B. INTEGRITY, AVAILABILITY and AUTHENTICITY
C. AVAILABILITY, AUTHENTICITY and CONFIDENTIALITY
D. AUTHENTICITY, CONFIDENTIALITY and INTEGRITY
A. CONFIDENTIALITY, INTEGRITY and AVAILABILITY
Which of the following tasks are identified by the Plan of Action and Milestones document? Each correct answer represents a complete solution. Choose all that apply.
A. The plans that need to be implemented
B. The resources needed to accomplish the elements of the plan
C. Any milestones that are needed in meeting the tasks
D. The tasks that are required to be accomplished
E. Scheduled completion dates for the milestones
B. The resources needed to accomplish the elements of the plan
C. Any milestones that are needed in meeting the tasks
D. The tasks that are required to be accomplished
E. Scheduled completion dates for the milestones
Authentication ensures that system users are who they say they are. At Colvine Tech, a system user must prove identity by providing an email address, a password, and answer a security question before being given logical access.
What factor of authentication fits this requirement?
A. Multi-factor authentication
B. Authentication and accountability
C. Single-factor authentication
D. Dual-factor authentication
C. Single-factor authentication
The ability to quickly adapt and recover from any known or unknown changes to the environment through holistic implementation of risk management, contingency, and continuity planning.
A. Resilience
B. Fragile
C. Inanimate
D. Silence
A. Resilience
A written plan for recovering one or more information systems at an alternate facility in response to a major hardware or software failure or destruction of facilities.
A. Disaster Recovery Plan (DRP)
B. Common Vulnerability Scoring System (CVSS)
C. Continuity of Operations Plan (COOP)
D. Common Vulnerability and Exposures (CVE)
A. Disaster Recovery Plan (DRP)
The loss of confidentiality, integrity, or availability could be expected to have a limited adverse effect, a serious adverse effect, or a severe or catastrophic adverse effect on organizational operations,
organizational assets, or individuals.
A. Potential Impact
B. High Impact
C. Low Impact
D. Moderate Impact
A. Potential Impact
Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?
A. Safeguards
B. Preventive controls
C. Detective controls
D. Corrective controls
D. Corrective controls
The official management decision given by a senior organizational official to authorize operation of an information system and to explicitly accept the risk to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation based on the implementation of an agreed‐upon set of security controls.
A. Authorization (to operate)
B. Systems operated
C. Security Authorization
D. Senior Organizational
A. Authorization (to operate)
Which of the following are the common roles with regard to data in an information classification system program?
Each correct answer represents a complete solution. Choose all that apply.
A. Custodian
B. User
C. Security auditor
D. Editor
E. Owner
A. Custodian
B. User
C. Security auditor
E. Owner
What RMF artifact establishes the scope of protection for an IS and encompass people, process, and info tech that are part of the system?
A. System Boundary
B. Risk Management Framework
C. Authorize
D. Categorization
A. System Boundary
The loss of confidentiality, integrity, or availability that could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, individuals, other organizations, or the national security interests of the United States; (i.e., 1) causes a severe degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is significantly reduced; 2) results in major damage to organizational assets; 3) results in major financial loss; or 4) results in severe
or catastrophic harm to individuals involving loss of life or serious life-threatening injuries).
A. High Impact
B. Low Impact
C. Medium Impact
D. Moderate Impact
A. High Impact
The findings from a security control assessment are documented in which of the following documents?
A. Security Assessment Plan (SAP)
B. Plan of Action & Milestones (POA&M)
C. Security Assessment Report (SAR)
D. System Security and Privacy Plan
C. Security Assessment Report (SAR)
The security control type for an information system that primarily are implemented and executed by people (as opposed to systems).
A. Operational
B. Technical
C. Organizational
D. Implementation
A. Operational
The security controls for an information system that primarily are implemented by people (as opposed to systems) are known as
A. Management controls
B. Operational controls
C. Technical controls
D. Logical controls
B. Operational controls
The authorizing official may determine that additional information supporting the authorization package is needed. The additional documentation may include all but one of the following.
A. Plan of action and milestones
B. Risk assessments
C. Contingency plans
D. Supply chain risk management plans
A. Plan of action and milestones
A business‐based framework for government wide improvement developed by the Office of Management and Budget that is intended to facilitate efforts to transform the federal government to one that is citizen‐ centered, results‐oriented, and market‐based.
A. Federal Enterprise Architecture
B. Net-Centric Architecture
C. Industry Standard Architecture
D. Enterprise Architecture
A. Federal Enterprise Architecture
You are working as a project manager in your organization. You are nearing the final stages of project execution and looking towards the final risk monitoring and controlling activities.
For your project archives, which one of the following is an output of risk monitoring and control?
A. Quantitative risk analysis
B. Qualitative risk analysis
C. Requested changes
D. Risk audits
C. Requested changes
Defining the types of information needed by the organization to successfully carry out identified missions and business processes as well as defining the organization’s internal and external information flows.
A. NIST SP 800-60
B. NIST SP 800-57
C. NIST SP 800-50
D. NIST SP 800-37
A. NIST SP 800-60
The set of minimum-security controls defined for a low-impact, moderate‐impact, or high‐impact information system.
A. Security Control Baseline
B. Minimum Security Baselines
C. None of these
D. Revised Control Baseline
A. Security Control Baseline
The security category of information 1 is determined to be: Confidentiality, low; Integrity, moderate; and availability, Moderate. The security category for information 2 is determined to be: confidentiality, Not Applicable, Integrity, Low; and availability, Moderate. What is the overall security category?
A. Security Category information type = (confidentiality, NOT APPLICABLE), (integrity, LOW), (availability,
MODERATE)
B. Security Category information type = (confidentiality, LOW), (integrity, LOW), (availability,
MODERATE)
C. Security Category information type = (confidentiality, NOT APPLICABLE), (integrity, MODERATE),
(availability, HIGH)
D. Security Category information type = (confidentiality, LOW), (integrity, MODERATE), (availability,
MODERATE)
D. Security Category information type = (confidentiality, LOW), (integrity, MODERATE), (availability,
MODERATE)
The emphasis of the revised NIST SP 800-37 process is on………….
Choose all that apply.
A. Building information security controls into government information systems by applying up-to-date management, operational and technical security controls.
B. Maintaining awareness of the security posture of information systems through the application of “enhanced monitoring processes.”
C. Providing senior leaders essential information to facilitate decision making with regard to risk acceptance.
D. Creating secured environment to provide guidance to individuals involved in security information systems.
E. Developing leadership to use, analyze and manage technical security of government information systems.
A. Building information security controls into government information systems by applying up-to-date management, operational and technical security controls.
B. Maintaining awareness of the security posture of information systems through the application of “enhanced monitoring processes.”
C. Providing senior leaders essential information to facilitate decision making with regard to risk acceptance.
Which of the following is NOT an objective of the security program?
A. Security plan
B. Security education
C. Security organization
D. Information classification
A. Security plan
Certification and Accreditation (C&A or CnA) is a process for implementing information security. Which of the following is the correct order of C&A phases in a DITSCAP assessment?
A. Definition, Validation, Verification, and Post Accreditation
B. Verification, Definition, Validation, and Post Accreditation
C. Verification, Validation, Definition, and Post Accreditation
D. Definition, Verification, Validation, and Post Accreditation
D. Definition, Verification, Validation, and Post Accreditation
Prepare, Categorize, select, and implement are steps or phases of the risk management framework which can be described as
A. The certification phase of the system authorization plan
B. The pre-certification phase of the system authorization plan
C. The authorization phase of the system authorization plan
D. The post-authorization phase of the system authorization plan
B. The pre-certification phase of the system authorization plan
A citizen of the United States or an alien lawfully admitted for permanent residence. Agencies may, consistent with individual practice, choose to extend the protections of the Privacy‐Act and E
Government Act to businesses, sole proprietors, aliens, etc.
A. Individual
B. Combined
C. Private
D. Mixed
A. Individual
The property of being genuine and being able to be verified and trusted, confidence in the validity of a transmission, a message, or message originator.
A. Authenticity
B. Validity
C. Complexity
D. Responsibility
A. Authenticity