Q: 11
The Security Category that guards against the improper modification or destruction of information and
includes ensuring information non-repudiation & authenticity.
Response:
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 12
The Security Content Automation Protocol (SCAP) is a method for which of the following?
Response:
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 13
A key part of the risk-based decision process is the recognition that regardless of the risk response,
There remains some risks known as:
Response:
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 14
When SCA conducted assessments are conducted in parallel with system development/acquisition &
implementation; it "does not" permit early identification of weaknesses & cost-effective corrective
action; True or False?
Response:
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 15
In the case of a complex information system, where a “leveraged authorization” that involves two
agencies will be conducted, what is the minimum number of system boundaries/accreditation
boundaries that can exist?
Response:
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 16
The Organization Level (Tier 1) strategy addresses/requires........
Response:
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 17
A discrete set of resources organized for the collection, processing, maintenance, or disposition of
information best describes one of the following
Response:
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 18
Which of the following is NOT considered an environmental threat source?
Response:
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 19
What are the responsibilities of a system owner?
Each correct answer represents a complete solution. Choose all that apply.
Response:
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 20
The Information System Security Officer (ISSO) and Information System Security Engineer (ISSE) play the
role of a supporter and advisor, respectively. Which of the following statements are true about ISSO and
ISSE?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2