Nist sp 800 12 - Study guides, Class notes & Summaries
Looking for the best study guides, study notes and summaries about Nist sp 800 12? On this page you'll find 62 study documents about Nist sp 800 12.
Page 4 out of 62 results
Sort by
-
CAP Exam 2024
- Exam (elaborations) • 24 pages • 2024
-
- $12.49
- + learn more
ISC2 CAP Exam 2024 
 
 
 
NO.1 The IAM/CA makes certification accreditation recommendations to the DAA. The DAA issues accreditation determinations.Which of the following are the accreditation determinations issued by the DAA?Each correct answer represents a complete solution. Choose all that apply. 
 
A. IATO 
B. ATO 
C. IATT 
D. ATT 
E. DATO - ANS A. IATO 
B. ATO 
C. IATT 
E. DATO 
 
NO.2 In 2003, NIST developed a new Certification & Accreditation (C&A) guideline known as FIPS 199. What lev...
-
WGU D431 Pre-Assessment Test 50 Questions and Answers 2024 Graded A
- Exam (elaborations) • 13 pages • 2024
- Available in package deal
-
- $15.39
- + learn more
WGU D431 Pre-Assessment Test 50 Questions and Answers 2024 Graded A 
 
1.	Which law requires both parties to consent to the recording of a conversation? 
 
a.	Electronic Communications Privacy Act (ECPA) 
 
b.	USA Patriot Act 
 
c.	Communications Assistance to Law Enforcement (CALEA) 
 
d.	Health Insurance Portability and Accountability Act (HIPPA) 
 
2.	Which law is related to the disclosure of personally identi昀椀able protected health information (PHI)? 
 
a.	Federal Privacy Act of 1974 
 
...
-
ISC2 (ISC)2 Certified in Cybersecurity - Exam Prep
- Exam (elaborations) • 73 pages • 2023
-
- $17.00
- + learn more
ISC2 (ISC)2 Certified in Cybersecurity - Exam Prep 
 
 
ISC2 (ISC)2 Certified in Cybersecurity - Exam Prep 
 
Document specific requirements that a customer has about any aspect of a vendor's service performance. 
 
A) DLR 
B) Contract 
C) SLR 
D) NDA 
C) SLR (Service-Level Requirements) 
_________ identifies and triages risks. 
Risk Assessment 
_________ are external forces that jeopardize security. 
Threats 
_________ are methods used by attackers. 
Threat Vectors 
_________ are the combinati...
-
CISSP EXAM QUESTIONS AND CORRECT ANSWERS
- Exam (elaborations) • 5 pages • 2024
- Available in package deal
-
- $9.99
- + learn more
CISSP EXAM QUESTIONS AND CORRECT ANSWERS...
-
FITSP-MANAGER Exam Questions and Answers 2023
- Exam (elaborations) • 33 pages • 2023
-
- $14.49
- + learn more
this legislation requires Federal agencies to develop document and implement an agency wide information security program - Answer- Clinger-Cohen 
 
What are the six steps of the RMF - Answer- Categorize 
Select 
Implement 
Assess 
Authorize 
Monitor 
 
What is the term used to evaluate operational information systems against the RMF, to determine the security controls in place and the requirements to mitigate risk at a acceptable level? - Answer- Gap Anaylsis 
 
What is the legal precedence - An...
Get paid weekly? You can!
-
(ISC)2 CC Practice Exam 1(QUESTIONS WITH 100% CORRECT ANSWERS
- Exam (elaborations) • 26 pages • 2024
-
- $13.49
- + learn more
(ISC)2 CC Practice Exam 1(QUESTIONS WITH 100% CORRECT ANSWERS ) 
Sensitivity is a measure of the ...: 
... importance assigned to information by its owner, or the purpose of representing its need for protection. 
 
(Sensitivity is also defined as the measure of the importance assigned to information by its owner, or the purpose of representing its need for protection) 
 
 
The process of verifying or proving the user's identification is known as: 
Authentication 
 
(Authentication is the verifi...
-
(ISC)2 Certified in Cybersecurity - Exam Prep ALL SOLUTION LATEST 2023/24 EDITION GUARANTEED GRADE A+
- Exam (elaborations) • 72 pages • 2023
-
- $16.39
- + learn more
Document specific requirements that a customer has about any aspect of a vendor's service performance. 
 
A) DLR 
B) Contract 
C) SLR 
D) NDA 
C) SLR (Service-Level Requirements) 
_________ identifies and triages risks. 
Risk Assessment 
_________ are external forces that jeopardize security. 
Threats 
_________ are methods used by attackers. 
Threat Vectors 
_________ are the combination of a threat and a vulnerability. 
Risks 
We rank risks by _________ and _________. 
Likelihood and impact 
...
-
ISC2 CC Exam Questions With 100% Correct Answers 2024/CC ISC2 Flashcards. 139 Questions and Correct Answers, With Complete Solution.
- Exam (elaborations) • 15 pages • 2024
-
- $12.98
- + learn more
ISC2 CC Exam Questions With 100% Correct Answers 2024/CC ISC2 Flashcards. 139 Questions and Correct Answers, With Complete Solution. 
 
What is MAC (Mandatory Access Control)? 
The operating system determines who gets access to resources. Much more restricted, not used as much. 
Which of the following is a detection control?: 
Bollards 
Turnstiles 
Firewalls 
Smoke sensors 
Smoke sensors. By definition, smoke detectors are fire protection devices employed for the early detection of fire. Firewal...
-
FITSP Exam Questions with Verified Answers (Graded A)
- Exam (elaborations) • 17 pages • 2023
-
- $12.99
- + learn more
___________________________ is a part of the U.S. Department of Commerce, and it includes an Information Technology Laboratory (ITL). - Answer- NIST National Institute of Standards and Technology. 
 
What does TIC stand for? - Answer- Trusted Internet Connection 
 
What does USA Patriot Act stand for? - Answer- United & Strengthening America by providing appropriate tools required to intercept and obstruct terrorism 
 
What does FISMA stand for? - Answer- Federal Information Security Management ...
-
FITSP-A Module 2Questions with correct Answers
- Exam (elaborations) • 17 pages • 2023
-
- $12.49
- + learn more
1. The following legislation requires federal agencies to establish capital planning and investment control policies and procedures when procuring information technology: 
 
a) E-Government Act of 2002 
b) Federal Information Security Management Act (FISMA) 
c) Government Information Security Reform Act (GISRA) 
d) Clinger-Cohen Act - Answer- d. Clinger-Cohen Act 
 
requires federal agencies to implement a CPIC process 
 
2. The following legislation requires federal agencies to appoint a Chief ...
That summary you just bought made someone very happy. Also get paid weekly? Sell your study resources on Stuvia! Discover all about earning on Stuvia