View Mode
Q: 11
The Security Category that guards against the improper modification or destruction of information and includes ensuring information non-repudiation & authenticity. Response:
Options
Q: 12
The Security Content Automation Protocol (SCAP) is a method for which of the following? Response:
Options
Q: 13
A key part of the risk-based decision process is the recognition that regardless of the risk response, There remains some risks known as: Response:
Options
Q: 14
When SCA conducted assessments are conducted in parallel with system development/acquisition & implementation; it "does not" permit early identification of weaknesses & cost-effective corrective action; True or False? Response:
Options
Q: 15
In the case of a complex information system, where a “leveraged authorization” that involves two agencies will be conducted, what is the minimum number of system boundaries/accreditation boundaries that can exist? Response:
Options
Q: 16
The Organization Level (Tier 1) strategy addresses/requires........ Response:
Options
Q: 17
A discrete set of resources organized for the collection, processing, maintenance, or disposition of information best describes one of the following Response:
Options
Q: 18
Which of the following is NOT considered an environmental threat source? Response:
Options
Q: 19
What are the responsibilities of a system owner? Each correct answer represents a complete solution. Choose all that apply. Response:
Options
Q: 20
The Information System Security Officer (ISSO) and Information System Security Engineer (ISSE) play the role of a supporter and advisor, respectively. Which of the following statements are true about ISSO and ISSE?
Options
Question 11 of 20 · Page 2 / 2

Premium Access Includes

  • Quiz Simulator
  • Exam Mode
  • Progress Tracking
  • Question Saving
  • Flash Cards
  • Drag & Drops
  • 3 Months Access
  • PDF Downloads
Get Premium Access
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail 10% DISCOUNT on YOUR PURCHASE