Fitsp a module 3 - Study guides, Class notes & Summaries
Looking for the best study guides, study notes and summaries about Fitsp a module 3? On this page you'll find 17 study documents about Fitsp a module 3.
Page 2 out of 17 results
Sort by
-
FITSP Manager-Part 2 Exam Questions and Answers
- Exam (elaborations) • 47 pages • 2024
-
- $14.49
- + learn more
FITSP Manager-Part 2 Exam Questions and Answers 
HIDS/HIPS - Answer ️️ -- Host-Based, 
- monitors the characteristics of a single host and the events occurring within that host for 
suspicious activity and most commonly deployed on critical hosts such as publicly accessible 
servers and servers containing sensitive information 
- network traffic (only for that host), system logs, running processes, application activity, file 
access and modification, and system and application configuration ...
-
FITSP-A Module 9 question and answers rated A+ 2023 Passed
- Exam (elaborations) • 15 pages • 2023
- Available in package deal
-
- $12.99
- + learn more
FITSP-A Module 9 question and answers rated A+ 2023 Passed1. All of the following are considered remote access, EXCEPT: 
 
a) Dial-up 
b) Broadband 
c) VPN 
d) Wireless - correct answer Correct answer: c) VPN 
 
NIST SP 800-53r4, Control AC-17, Supplemental Guidance states: "Remote access methods include, for example, dial-up, broadband, and wireless. Organizations often employ encrypted virtual private networks (VPNs) to enhance confidentiality and integrity over remote connections." 
 
Incor...
-
FITSP-A Module 3 question n answers graded A+ 2023
- Exam (elaborations) • 16 pages • 2023
- Available in package deal
-
- $11.49
- + learn more
FITSP-A Module 3
-
FITSP-A Module 8 question and answers rated A+ 2023 LATEST UPDATE
- Exam (elaborations) • 13 pages • 2023
- Available in package deal
-
- $11.49
- + learn more
FITSP-A Module 8 question and answers rated A+ 2023 LATEST UPDATE 
1. The implementation of a continuous monitoring program results in ongoing updates to all of the following documents, EXCEPT: 
 
a) Security Plan 
b) Security Assessment Plan 
c) Security Assessment Report 
d) Plan of Action & Milestones - correct answer Correct answer: b) Security Assessment Plan 
 
NIST SP 800-137, Chapter 1 states: "Frequent updates to security plans, security assessment reports, plans of action and mileston...
-
FITSP-A Module 7 Questions and Answers
- Exam (elaborations) • 9 pages • 2023
-
- $10.99
- + learn more
1. Name the reporting tool, which automates Agency FISMA reporting directly to the DHS. 
 
a) FISMA 
b) DHS Reporting Metrics 
c) Cyberscope 
d) Cyberstat - Answer- Correct answer: c) CyberScope. 
 
In OMB M-10-15, CyberScope was designated as the reporting tool for FISMA reporting. 
 
Incorrect answers: a) FISMA requires the reports; b) DHS Reporting Metrics indicate what must be reported; d) CyberStat refers to OMB's reviews 
 
2. Which family of security controls is considered Tier 2? 
 
a) ...
Want to regain your expenses?
-
FITSP-A Module 3 QUESTIONS WITH COMPLETE SOLUTIONS
- Exam (elaborations) • 11 pages • 2023
- Available in package deal
-
- $12.99
- + learn more
1. What elements are components of an information system? 
a) Hardware and software 
b) Interconnected systems 
c) People 
d) All of the above correct answer: Correct answer: d) All of the above 
OMB Circular A-130, App ill: "A system normally includes hardware, software, information, data, applications, communications, and people.' 
Incorrect answers: The individual choices alone do not constitute a system. Information systems must be considered in a holistic manner. 
 
2. What are some of ...
-
FITSP-A Module 4 Questions and Answers (Graded A)
- Exam (elaborations) • 9 pages • 2023
-
- $10.49
- + learn more
1. List the 3 security objectives under FISMA. 
a) Confidentiality, Integrity, Authentication 
b) Confidentiality, Integrity, Availability 
c) Containment, Integrity, Availability 
d) Confidentiality, Impact, Availability - Answer- Correct answer: b) Confidentiality, Integrity, Availability 
 
FISMA 2002, Section 3542 states: "The term 'information security' means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction...
How much did you already spend on Stuvia? Imagine there are plenty more of you out there paying for study notes, but this time YOU are the seller. Ka-ching! Discover all about earning on Stuvia