100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CAP Review Questions & Verified Solutions for 2024. $25.49   Add to cart

Exam (elaborations)

CAP Review Questions & Verified Solutions for 2024.

 3 views  0 purchase
  • Course
  • CAPA - Certified Accounts Payable Associate
  • Institution
  • CAPA - Certified Accounts Payable Associate

CAP Review Questions & Verified Solutions for 2024.CAP Review Questions & Verified Solutions for 2024.CAP Review Questions & Verified Solutions for 2024.CAP Review Questions & Verified Solutions for 2024.CAP Review Questions & Verified Solutions for 2024.

Preview 3 out of 17  pages

  • October 6, 2024
  • 17
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CAPA - Certified Accounts Payable Associate
  • CAPA - Certified Accounts Payable Associate
avatar-seller
Lectjoe
CAP Review Questions & Verified Solutions for
2024.
1. During which Risk Management Framework (RMF) step is the system security plan
initially approved?

A. RMF Step 1 Categorize Information System
B. RMF Step 2 Select Security Controls
C. RMF Step 3 Implement Security Controls
D. RMF Step 5 Authorize Information System - Correct answer B. RMF Step 2 Select
Security Controls

The system security plan is first approved by the authorizing official or AO designated
representative during execution of RMF Step 2, Task 2-4.
Security Plan Approval. See: CAP® CBK® Chapter 2, Task 2-4: Approval Security Plan;
NIST SP800-37, Revision 1, RMF Step 2, Task 2-4: Security Plan Approval.

2. Which organizational official is responsible for the procurement, development,
integration, modification, operation, maintenance, and disposal of an information
system?

A. Information system security engineer (ISSE)
B. Chief information officer (CIO)
C. Information system owner (ISO)
D. Information security architect - Correct answer C. Information system owner (ISO)

According to National Institute of Standards and Technology Special Publication (NIST
SP) 800-37, Revision 1, Appendix D.9 Information System Owner, the information
system owner is an organizational official responsible for the procurement,
development, integration, modification, operation, maintenance, and disposal of an
information system. The information system owner serves as the focal point for the
information system. In that capacity, the information system owner (ISO) serves both as
an owner and as the central point of contact between the authorization process and the
owners of components of the system. See also CAP® CBK® Chapter 1, System
Authorization Roles and Responsibilities, Primary Roles and Responsibilities.

3. Which authorization approach considers time elapsed since the authorization results
were produced, the environment of operation, the criticality/sensitivity of the information,
and the risk tolerance of the other?
Organization?

A. Leveraged
B. Single
C. Joint
D. Site specific - Correct answer A. Leveraged

,With this approach, the leveraging organization considers risk factors such as the time
elapsed since the authorization results were originally produced; the current
environment of operation (if different from the environment of operation reflected in the
authorization package); the criticality/sensitivity of the information to be processed,
stored, or transmitted (if different from the state of the original authorization); as well as
the overall risk tolerance of the leveraging organization (in the event that the risk
tolerance posture has changed over time).
See NIST SP 800-37, Revision 1, Appendix F.9 Authorization Approaches.

4. System authorization programs are marked by frequent failure due to, among other
things, poor planning, poor systems inventory, failure to fix responsibility at the system
level, and

A. inability to work with remote teams.
B. lack of a program management office.
C. insufficient system rights.
D. lack of management support. - Correct answer D. lack of management support.

Lack of management support results from failure to connect system authorization to
budgeting for resources, as well as excessive paperwork, lack of enforcement, and poor
timing and, among others.
See CAP® CBK® Chapter 1, Why System Authorization Programs Fail.

5. In what phases of the Risk Management Framework (RMF) and system development
life cycle (SDLC), respectively, does documentation of control implementation start?

A. Categorization and initiation
B. Implement security controls and development/acquisition
C. Authorization and operations/maintenance
D. Monitor and sunset - Correct answer B. Implement security controls and
development/acquisition

Security control documentation that describes how system-specific, hybrid, and
common controls are implemented are part of the RMF Step 3—implement security
controls and the SDLC development/acquisition; implementation phases. The
documentation formalizes plans and expectations regarding the overall functionality of
the information system. The functional description of the security control implementation
includes planned inputs, expected behavior, and expected outputs where appropriate,
typically for those technical controls that are employed in the hardware, software, or
firmware components of the information system. See CAP® CBK® Chapter 4,
Application of Security Controls, Task 3-1: Implement Security Controls; NIST SP 800-
37, Revision 1, Step 3, Task 3-1: Security Control Implementation.

6. The tiers of the National Institute of Standards and Technology (NIST) risk
management framework are

, A. operational, management, system.
B. confidentiality, integrity, availability.
C. organization, mission/business process, information system.
D. prevention, detection, recovery. - Correct answer C. organization, mission/business
process, and information system.

According to NIST SP 800-39, 2.2 Multitier Risk Management, the three tiers of the
RMF are organization, mission/business process, and information systems. Answer a
("operational, management,
System") is a distracter. Answer B ("confidentiality, integrity, availability") refers to
security impacts of information and systems determined during categorization. Answer
D relates to a common typology for
Security controls.
See also CAP® CBK® Chapter 1, Fundamentals of Information Systems Risk
Management, and Guidance on Organization-Wide Risk Management.

7. National Institute of Standards and Technology (NIST) guidance classifies security
controls as

A. production, development. And test.
B. people, process, and technology.
C. system-specific, common and hybrid.
D. technical, administrative, and program. - Correct answer C. system-specific, common
and hybrid.

According to NIST SP 800-37, Revision 1, Chapter Two—The Fundamentals, 2.4
Security Control Allocation, security control allocation classifies controls as either
system specific, common controls, or a hybrid with qualities of each. Answer A relates
to operating environments. Answer B is a common taxonomy for security components.
Answer D is a common taxonomy for types of security controls but is not used in NIST
guidance. See also CAP® CBK® Chapter 1, Fundamentals of Information Systems
Risk Management.

8. Which of the following specifies security requirements for federal information and
information systems in 17 security-related areas that represent a broad-based,
balanced information security program?

A. Federal Information Processing Standard (FIPS) 199, Standards for Security
Categorization of Federal Information and Information Systems
B. FIPS 200, Minimum Security Requirements for Federal Information and Information
Systems
C. Committee on National Security Systems (CNSS) Instruction No. 1253, Security
Categorization and Control Selection for National Security Systems

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Lectjoe. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $25.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

78834 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$25.49
  • (0)
  Add to cart