The organization level is the Tier 1 and it addresses risks from an organizational perspective. What are the various Tier 1 activities? Each correct answer represents a complete solution. Choose all that apply.
#31
Answer: ABC✅ Correct❌ Incorrect
Which of the following roles is also known as the accreditor?
#32
Answer: D✅ Correct❌ Incorrect
Which of the following life cycle modeling activities establishes service relationships and message exchange paths?
#33
Answer: C✅ Correct❌ Incorrect
You have a storage media with some data and you make efforts to remove this data. After performing this, you analyze that the data remains present on the media. Which of the following refers to the above mentioned condition?
#34
Answer: D✅ Correct❌ Incorrect
Certification and Accreditation (C&A or CnA) is a process for implementing information security. It is a systematic procedure for evaluating, describing, testing, and authorizing systems prior to or after a system is in operation. Which of the following statements are true about Certification and Accreditation? Each correct answer represents a complete solution. Choose two.
#35
Answer: AC✅ Correct❌ Incorrect
In which of the following cryptographic attacking techniques does an attacker obtain encrypted messages that have been encrypted using the same encryption algorithm?
#36
Answer: D✅ Correct❌ Incorrect
The IAM/CA makes certification accreditation recommendations to the DAA. The DAA issues accreditation determinations. Which of the following are the accreditation determinations issued by the DAA? Each correct answer represents a complete solution. Choose all that apply.
#37
Answer: BD✅ Correct❌ Incorrect
Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is created to prevent interruptions to normal business activity?
#38
Answer: D✅ Correct❌ Incorrect
Which of the following specifies access privileges to a collection of resources by using the URL mapping?
#39
Answer: B✅ Correct❌ Incorrect
You are the project manager of QSL project for your organization. You are working with your project team and several key stakeholders to create a diagram that shows how various elements of a system interrelate and the mechanism of causation within the system. What diagramming technique are you using as a part of the risk identification process?
#40
Answer: A✅ Correct❌ Incorrect
Which of the following is a signature-based intrusion detection system (IDS) ?
#41
Answer: D✅ Correct❌ Incorrect
Which of the following statements about the availability concept of Information security management is true?
#42
Answer: C✅ Correct❌ Incorrect
Microsoft software security expert Michael Howard defines some heuristics for determining code review in "A Process for Performing Security Code Reviews".
Which of the following heuristics increase the application's attack surface? Each correct answer represents a complete solution. Choose all that apply.
#43
Answer: BDEF✅ Correct❌ Incorrect
A security policy is an overall general statement produced by senior management that dictates what role security plays within the organization. Which of the following are required to be addressed in a well designed policy? Each correct answer represents a part of the solution. Choose all that apply.
#44
Answer: ABC✅ Correct❌ Incorrect
The Phase 4 of DITSCAP C&A is known as Post Accreditation. This phase starts after the system has been accredited in Phase 3. What are the process activities of this phase? Each correct answer represents a complete solution. Choose all that apply.
#45
Answer: BCDE✅ Correct❌ Incorrect
Which of the following are the primary functions of configuration management?
Each correct answer represents a complete solution. Choose all that apply.
#46
Answer: BCD✅ Correct❌ Incorrect
Which of the following are included in Technical Controls? Each correct answer represents a complete solution. Choose all that apply.
#47
Answer: ABCDE✅ Correct❌ Incorrect
What are the various phases of the Software Assurance Acquisition process according to the U.S. Department of Defense (DoD) and Department of Homeland
Security (DHS) Acquisition and Outsourcing Working Group?
#48
Answer: C✅ Correct❌ Incorrect
Companies use some special marks to distinguish their products from those of other companies. These marks can include words, letters, numbers, drawings, etc.
Which of the following terms describes these special marks?
#49
Answer: B✅ Correct❌ Incorrect
Which of the following terms ensures that no intentional or unintentional unauthorized modification is made to data?
#50
Answer: B✅ Correct❌ Incorrect
Continuous Monitoring is the fourth phase of the security certification and accreditation process. What activities are performed in the Continuous Monitoring process? Each correct answer represents a complete solution. Choose all that apply.
#51
Answer: BDE✅ Correct❌ Incorrect
Which of the following statements are true about declarative security? Each correct answer represents a complete solution. Choose all that apply.
#52
Answer: AB✅ Correct❌ Incorrect
What project management plan is most likely to direct the quantitative risk analysis process for a project in a matrix environment?
#53
Answer: C✅ Correct❌ Incorrect
The DoD 8500 policy series represents the Department's information assurance strategy. Which of the following objectives are defined by the DoD 8500 series?
Each correct answer represents a complete solution. Choose all that apply.
#54
Answer: ACD✅ Correct❌ Incorrect
Which of the following vulnerabilities occurs when an application directly uses or concatenates potentially hostile input with data file or stream functions?
#55
Answer: D✅ Correct❌ Incorrect
You work as a project manager for BlueWell Inc. You with your team are using a method or a (technical) process that conceives the risks even if all theoretically possible safety measures would be applied. One of your team member wants to know that what is a residual risk. What will you reply to your team member?
#56
Answer: D✅ Correct❌ Incorrect
DoD 8500.2 establishes IA controls for information systems according to the Mission Assurance Categories (MAC) and confidentiality levels. Which of the following MAC levels requires high integrity and medium availability?
#57
Answer: D✅ Correct❌ Incorrect
You are the project manager of the NNN project for your company. You and the project team are working together to plan the risk responses for the project. You feel that the team has successfully completed the risk response planning and now you must initiate what risk process it is. Which of the following risk processes is repeated after the plan risk responses to determine if the overall project risk has been satisfactorily decreased?
#58
Answer: A✅ Correct❌ Incorrect
Which of the following statements is true about residual risks?
#59
Answer: A✅ Correct❌ Incorrect
To help review or design security controls, they can be classified by several criteria . One of these criteria is based on their nature. According to this criterion, which of the following controls consists of incident response processes, management oversight, security awareness, and training?