FITSP
Liberty University
All 19 results
Sort by
-
FITSP-A Module 4 QUESTIONS AND ANSWERS
- Exam (elaborations) • 8 pages • 2023
- Available in package deal
-
- $11.49
- + learn more
1. List the 3 security objectives under FISMA. 
a) Confidentiality, Integrity, Authentication 
b) Confidentiality, Integrity, Availability 
c) Containment, Integrity, Availability 
d) Confidentiality, Impact, Availability correct answer: Correct answer: b) Confidentiality, Integrity, Availability 
 
FISMA 2002, Section 3542 states: "The term 'information security' means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or dest...
-
FITSP-A Module 10 QUESTIONS AND ANSWERS
- Exam (elaborations) • 11 pages • 2023
- Available in package deal
-
- $11.49
- + learn more
1. What is defined as a simulation of an emergency designed to validate the viability of one or more aspects of an ISCP? 
 
a) ISCP Test 
b) ISCP Exercise 
c) ISCP Training 
d) ISCP Drill correct answer: Correct answer: b) ISCP Exercise 
 
NIST SP 800-34rl, Paragraph 3.5.3 states: "An exercise is a simulation of an emergency designed to validate the viability of one or more aspects of an ISCP." 
 
Incorrect answers: a) ISCP Testing takes many forms, but is not necessarily scenario-based; c) I...
-
FITSP-A Module 9 QUESTIONS AND ANSWERS
- Exam (elaborations) • 11 pages • 2023
- Available in package deal
-
- $12.99
- + learn more
1. All of the following are considered remote access, EXCEPT: 
 
a) Dial-up 
b) Broadband 
c) VPN 
d) Wireless correct answer: Correct answer: c) VPN 
 
NIST SP 800-53r4, Control AC-17, Supplemental Guidance states: "Remote access methods include, for example, dial-up, broadband, and wireless. Organizations often employ encrypted virtual private networks (VPNs) to enhance confidentiality and integrity over remote connections." 
 
Incorrect answers: a), b), and d) are remote access methods as ...
-
FITSP-A 283 QUESTIONS AND ANSWERS
- Exam (elaborations) • 20 pages • 2023
- Available in package deal
-
- $13.49
- + learn more
What elements are components of an information system? correct answer: OMB Circular A-130, App III: "A system normally includes hardware, software, information, data, applications, communications, and people." 
 
What are some of the threats that the information system faces? correct answer: NIST SP 800-39rl, p. 1: "Threats to information and information systems can include purposeful attacks, environmental disruptions, and human/machine errors and result in great harm to the national and e...
-
FITSP-A Module 7 QUESTIONS WITH COMPLETE SOLUTIONS
- Exam (elaborations) • 9 pages • 2023
- Available in package deal
-
- $10.49
- + learn more
1. Name the reporting tool, which automates Agency FISMA reporting directly to the DHS. 
 
a) FISMA 
b) DHS Reporting Metrics 
c) Cyberscope 
d) Cyberstat correct answer: Correct answer: c) CyberScope. 
 
In OMB M-10-15, CyberScope was designated as the reporting tool for FISMA reporting. 
 
Incorrect answers: a) FISMA requires the reports; b) DHS Reporting Metrics indicate what must be reported; d) CyberStat refers to OMB's reviews 
 
2. Which family of security controls is considered Tier 2?...
As you read this, a fellow student has made another $4.70
-
FITSP-A Module 8 QUESTIONS WITH COMPLETE SOLUTIONS
- Exam (elaborations) • 9 pages • 2023
- Available in package deal
-
- $11.49
- + learn more
1. The implementation of a continuous monitoring program results in ongoing updates to all of the following documents, EXCEPT: 
 
a) Security Plan 
b) Security Assessment Plan 
c) Security Assessment Report 
d) Plan of Action & Milestones correct answer: Correct answer: b) Security Assessment Plan 
 
NIST SP 800-137, Chapter 1 states: "Frequent updates to security plans, security assessment reports, plans of action and milestones, hardware and software inventories, and other system information...
-
FITSP Manager-Part 2| 242 QUESTIONS| WITH COMPLETE SOLUTIONS| 37 PAGES
- Exam (elaborations) • 37 pages • 2023
- Available in package deal
-
- $12.99
- + learn more
HIDS/HIPS correct answer: - Host-Based, 
- monitors the characteristics of a single host and the events occurring within that host for suspicious activity and most commonly deployed on critical hosts such as publicly accessible servers and servers containing sensitive information 
- network traffic (only for that host), system logs, running processes, application activity, file access and modification, and system and application configuration changes. 
 
NIST SP 800-60, Rev 1 correct answer: S...
-
FITSP-A Module 3 QUESTIONS WITH COMPLETE SOLUTIONS
- Exam (elaborations) • 11 pages • 2023
- Available in package deal
-
- $12.99
- + learn more
1. What elements are components of an information system? 
a) Hardware and software 
b) Interconnected systems 
c) People 
d) All of the above correct answer: Correct answer: d) All of the above 
OMB Circular A-130, App ill: "A system normally includes hardware, software, information, data, applications, communications, and people.' 
Incorrect answers: The individual choices alone do not constitute a system. Information systems must be considered in a holistic manner. 
 
2. What are some of ...
-
FITSP-A Module 1 Laws and Regs
- Exam (elaborations) • 2 pages • 2023
- Available in package deal
-
- $8.49
- + learn more
Clinger-Cohen Act correct answer: The following legislation requires federal agencies to establish capital planning and investment control policies and procedures when procuring information technology: 
 
Clinger-Cohen Act correct answer: The following legislation requires federal agencies to appoint a Chief Information Officer: 
 
Federal Information Security Modernization Act of 2014 (FISMA) correct answer: The following legislation requires federal agencies to develop, document and impleme...
-
FITSP-A Module 5 QUESTIONS AND ANSWERS
- Exam (elaborations) • 8 pages • 2023
- Available in package deal
-
- $12.49
- + learn more
1. An assessment object for each security control, which identifies the specific control items being assessed and testing techniques, can be found in which document? 
 
a) NIST Special Publication 800-37 Revision 1, Guide for Applying the Risk Management Framework to Federal Information Systems 
b) NIST Special Publication 800-53 Revision 4, Recommended Security Controls for Federal Information Systems and Organizations 
c) NIST Special Publication 800-53A Revision 4, Guide for Assessing the Sec...
How did he do that? By selling his study resources on Stuvia. Try it yourself! Discover all about earning on Stuvia