FITSP-MANAGER EXAM UPDATED EXAM
WITH VERIFIED SOLUTIONS.
____________takes streams of data and reduces it to fixed size
through a one-way mathematical function. - correct answer -
Secure hash function
What does digital signature provide? - correct answer -Non-
repudiation (authentication + integrity)
What are PKI components - correct answer -Certificate Authority
(CA)
Registration Authority (RA)
Respository - database of active digital cert for a CA
Archive - database of info to be used in settling future disputes
Public key certificate
Certificate Revocation Lists
Pki users
What are key establisment - correct answer -rsa
Diffie-Hellman
, Page | 2
Fortezza-kea - key agreement algorithm used by Fortezza card
supported by DOD
What symmetric encryption algorithms provide confidentiality? -
correct answer -IDEA
RC4
3DES-EDE
AES
What Signature and Hashes? - correct answer -RSA - signature
DSA - signature
MD5 - hash
SHA1 - hash
In what security mode are Bluetooth devices considered
promiscuous? - correct answer -Security Mode 1 is non-secure
NIST Interagency or Internal Reports (nistirs) describe research of
a technical nature of interes to specialized audience. True or
False - correct answer -True
, Page | 3
What are some NIST Interagency Reports? - correct answer -IR
7581 - System and Network Security Acronyms and Abbreviatons
What does NIST IR 7564 provied? - correct answer -This report
discusses security metrics.
Metrics are categorize as
Strategic Support
Quality Assurance
Tactical Oversight
What is the annual NIST Intergency Report? - correct answer -IR
7816 -2011 Computer Security Division Report. This report
published by NIST CSD outlines the units accomplishments
during fy 2011
What does NIST IR 7359 Information Security Guide for Gov
Executives? - correct answer -Provides an overview of info
security program concept to assist senior leadership in
understanding how to oversee and support the development and
implementation of security program
, Page | 4
What does IR 7536 cover? - correct answer -- last year various
divisions
- biometrics validation and implementation of under FIPS-201 and
HSPD-12
-highlights FISMA implementation projects and associated SP
Crypto Module Validation Program
Crypto Algorithm Validation Program
This provide federal agencies in US, Canada and United Kingdom
with confidence that a validated cryptographic module meets a
claimed level of security assurance.
What does IR 7358 - Program Review for Information Security
Management Assistance (PRISMA) provides? - correct answer -
Utilizes a standardized approach for review and measurement of
an information security program.
What does PRISM Topic Areas of Coverage provide? - correct
answer -The first 8 topic areas focus on the strategic aspect of
info security program management. The review identifies the level
of maturity of the info sec program and the agency's ability to
comply with existing requirement in the 8 areas.