Fitsp a module 3 - Study guides, Class notes & Summaries

Looking for the best study guides, study notes and summaries about Fitsp a module 3? On this page you'll find 17 study documents about Fitsp a module 3.

Page 2 out of 17 results

Sort by:

FITSP-A Module 3 question n answers graded A+ 2023
FITSP-A Module 4 Correctly answered 2023 updated to pass
  • Exam (elaborations)

    FITSP-A Module 4 Correctly answered 2023 updated to pass

  • FITSP-A Module 4 Correctly answered 2023 updated to pass 1. List the 3 security objectives under FISMA. a) Confidentiality, Integrity, Authentication b) Confidentiality, Integrity, Availability c) Containment, Integrity, Availability d) Confidentiality, Impact, Availability - correct answer Correct answer: b) Confidentiality, Integrity, Availability FISMA 2002, Section 3542 states: "The term 'information security' means protecting information and information systems from unauthorized a...
  • StuviaExamHub
    $11.49 More Info
FITSP-A Module 9 question and answers rated A+ 2023 Passed
  • Exam (elaborations)

    FITSP-A Module 9 question and answers rated A+ 2023 Passed

  • FITSP-A Module 9 question and answers rated A+ 2023 Passed1. All of the following are considered remote access, EXCEPT: a) Dial-up b) Broadband c) VPN d) Wireless - correct answer Correct answer: c) VPN NIST SP 800-53r4, Control AC-17, Supplemental Guidance states: "Remote access methods include, for example, dial-up, broadband, and wireless. Organizations often employ encrypted virtual private networks (VPNs) to enhance confidentiality and integrity over remote connections." Incor...
  • StuviaExamHub
    $13.49 More Info
FITSP-A Module 8 question and answers rated A+ 2023 LATEST UPDATE
  • Exam (elaborations)

    FITSP-A Module 8 question and answers rated A+ 2023 LATEST UPDATE

  • FITSP-A Module 8 question and answers rated A+ 2023 LATEST UPDATE 1. The implementation of a continuous monitoring program results in ongoing updates to all of the following documents, EXCEPT: a) Security Plan b) Security Assessment Plan c) Security Assessment Report d) Plan of Action & Milestones - correct answer Correct answer: b) Security Assessment Plan NIST SP 800-137, Chapter 1 states: "Frequent updates to security plans, security assessment reports, plans of action and mileston...
  • StuviaExamHub
    $11.99 More Info
FITSP-A Module 3 QUESTIONS WITH COMPLETE SOLUTIONS
  • Exam (elaborations)

    FITSP-A Module 3 QUESTIONS WITH COMPLETE SOLUTIONS

  • 1. What elements are components of an information system? a) Hardware and software b) Interconnected systems c) People d) All of the above correct answer: Correct answer: d) All of the above OMB Circular A-130, App ill: "A system normally includes hardware, software, information, data, applications, communications, and people.' Incorrect answers: The individual choices alone do not constitute a system. Information systems must be considered in a holistic manner. 2. What are some of ...
  • Classroom
    $13.49 More Info
FITSP-A Module 4 Questions and Answers (Graded A)
  • Exam (elaborations)

    FITSP-A Module 4 Questions and Answers (Graded A)

  • 1. List the 3 security objectives under FISMA. a) Confidentiality, Integrity, Authentication b) Confidentiality, Integrity, Availability c) Containment, Integrity, Availability d) Confidentiality, Impact, Availability - Answer- Correct answer: b) Confidentiality, Integrity, Availability FISMA 2002, Section 3542 states: "The term 'information security' means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction...
  • Gordones22
    $10.99 More Info
FITSP-A Module 7 Questions and Answers
  • Exam (elaborations)

    FITSP-A Module 7 Questions and Answers

  • 1. Name the reporting tool, which automates Agency FISMA reporting directly to the DHS. a) FISMA b) DHS Reporting Metrics c) Cyberscope d) Cyberstat - Answer- Correct answer: c) CyberScope. In OMB M-10-15, CyberScope was designated as the reporting tool for FISMA reporting. Incorrect answers: a) FISMA requires the reports; b) DHS Reporting Metrics indicate what must be reported; d) CyberStat refers to OMB's reviews 2. Which family of security controls is considered Tier 2? a) ...
  • Gordones22
    $11.49 More Info
Want to regain your expenses?
How much did you already spend on Stuvia? Imagine there are plenty more of you out there paying for study notes, but this time YOU are the seller. Ka-ching!