100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
FITSP-MANAGER CORRECT QUESTIONS & ANSWERS(2024 LATEST UPDATE )CORRECT 100% £11.05   Add to cart

Exam (elaborations)

FITSP-MANAGER CORRECT QUESTIONS & ANSWERS(2024 LATEST UPDATE )CORRECT 100%

 6 views  0 purchase
  • Module
  • FITSP-Auditor
  • Institution
  • FITSP-Auditor

this legislation requires Federal agencies to develop document and implement an agency wide information security program - ANSWER Clinger-Cohen What are the six steps of the RMF - ANSWER Categorize Select Implement Assess Authorize Monitor What is the term used to evaluate operational in...

[Show more]

Preview 4 out of 47  pages

  • August 19, 2024
  • 47
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • FITSP-Auditor
  • FITSP-Auditor
avatar-seller
FITSP-MANAGER
CORRECT QUESTIONS
& ANSWERS(2024
LATEST
UPDATE )CORRECT
100%
this legislation requires Federal agencies to develop document and implement an agency wide
information security program - ANSWER Clinger-Cohen



What are the six steps of the RMF - ANSWER Categorize

Select

Implement

Assess

Authorize

Monitor

,What is the term used to evaluate operational information systems against the RMF, to determine the
security controls in place and the requirements to mitigate risk at a acceptable level? - ANSWER Gap
Anaylsis



What is the legal precedence - ANSWER Consitution

Public Law

Executive Orders/Presidential Directives

Processing Standards

Agency Regulations

State / Local Laws

Industry Standards



What is the Privacy Act - 1974 four basic policy objectives? - ANSWER Restict disclosure

Increased rights of access to agency records

Grant individuals the rights to seek amendment

Establish a code of fair information practices



What is the purpose of Computer Fraud and Abuse Act (CFAA) - 1986? - ANSWER Intended to reduce
cracking of computer systems and to address Federal computer-related offenses.



Governs case with a compelling Federal interest.



What computer in theory are covered by the CFAA and defined as protected computers? - ANSWER
Exclusively used by a financial institution or the US goverment, or any computer when the conduct
constituting the offense affect the computer use by or for the financial institution or the goverement



Used in or affecting interstate or foreign commerce or communication, including a computer located
outside the US.



What does the Electronic Communications Privacy Act of 1986 (ECPA) restrict, prohibit and permit? -
ANSWER Restict wire taps from telephone call to include transmissions of electronic data by computer

, Prohibit access to store electronic communications



Permits the tracing of telephone communications



What superseded the Computer Security Act of 1987? - ANSWER FISMA of 2002



Why was the the Computer Security Act - 1987 passed? - ANSWER To improved the security and privacy
of sensitive information in Federal systems, and to establish a minimum acceptable security practices for
such systems.



What does the Computer Security Act - 1987 assign, require and mandate. - ANSWER Assigned NIST
formerly know as National Bureau of Standards) to develop standard of minumum acceptable practices
with help of the NSA



Required the establishment of security policies of Federal computer system that contain sensitive
information



Mandated security awareness training for Federal employees that use those systems




What is the USA Patriot Act full title? - ANSWER The USA PATRIOT Act is an Act of Congress that was
signed into law by President George W. Bush on October 26, 2001.[1] With its ten-letter abbreviation
(USA PATRIOT) expanded, the full title is "Uniting and Strengthening America by Providing Appropriate
Tools Required to Intercept and Obstruct Terrorism Act of 2001".



What does E-Goverment Act of 2002 accomplish? - ANSWER Establish a Federal CIO within OMB

Areas of E-Gov:

-Capital planning and investment control for information technology

-Development of enterprise architectures (FEA)

-Information Security (Title III) - aka FISMA

-Access to goverment infomation

, Establish CIO counsel in the Executive Branch



What is FISMA? - ANSWER Title III of E-Gov Act 2002

Requires each federal agency to implement an information security program

Reports annually to OMB on:

-Adequacy of security program

-Adequacy of plans and reports relating to annual budgets

-Significant deficiency

Continuously evolving



What is HITECH? - ANSWER The Health Information Technology for Economic and Clinical Health Act
(HITECH Act) mandates audits of health care providers to investigate and determine if they are in
compliance with the HIPAA Privacy Rule (effective in 2003) and Security Rule (effective in 2005). It's part
of ARRA in 2009.



What is COPPA? - ANSWER The Children's Online Privacy Protection Act (COPPA) is a law created to
protect the privacy of children under 13. The Act was passed by the U.S. Congress in 1998 and took
effect in April 2000. COPPA is managed by the Federal Trade Commission (FTC).



What is the Economic Espionage Act (EEA) 1998 - ANSWER The Economic Espionage Act of 1996 (EEA),
18 U.S.C. §§ 1831-1839, defines the term "economic espionage" as the theft or misappropriation of a
trade secret with the intent or knowledge that the offense will benefit any foreign government, foreign
instrumentality, or foreign agent.



What is the purpose Office of Management and Budget Circular A-11 - ANSWER Preparation, Submission
and Execution of the Budget, June 2008.



What is the purpose Office of Management and Budget Circular A-123 - ANSWER Management's
Responsibility for Enterprise Risk Management and Internal Control (Revised 07/15/2016)



What is the purpose Office of Management and Budget Circular A-127-Revised - ANSWER OMB Circular
A-127 prescribes policies and standards for executive departments and agencies to follow when
managing their financial management systems January 2009

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller shantelleG. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for £11.05. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67096 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy revision notes and other study material for 14 years now

Start selling
£11.05
  • (0)
  Add to cart