Study online at https://quizlet.com/_e93803
1. Congress created the _____________ in response Federal Information Security Man-
to the September 11, 2001, terrorist attacks. agement Act (FISMA)
2. Each agency must report yearly to the OMB on Senate Committee on Foreign Rela-
its FISMA compliance activities. An agency also tions
must send a copy of their yearly report to each
of these agencies with the exception of:
3. FISMA requires federal agencies to secure na- Classified
tional security systems using a risk-based ap-
proach, but this does not apply to ____________
information.
4. FISMA requires the Department of Commerce National Institute of Standards and
to create information security standards and Technology (NIST)
guidelines. To which of the following organiza-
tions did the Department of Commerce dele-
gate this responsibility?
5. In May 2007, the ___________________ required all OMB
federal agencies to create a breach notification
plan. This instruction was issued in response
to a large data breach at the Department of
Veterans Affairs
6. The ________________ enforces trade sanctions Office of Foreign Assets Control
and embargoes and prohibits trade with cer- (OFAC)
tain people in other countries.
7. The _________________ requires all federal agen- Office of Management and Budget
cies to create a breach notification plan. (OMB)
8. Privacy Act of 1974
, ITN 267 FINAL EXAM REVIEW
Study online at https://quizlet.com/_e93803
The ______________________ was created by Con-
gress to protect data collected by the govern-
ment.
9. The __________________________enforces trade Office of Foreign Assets Control
sanctions and embargoes. (OFAC)
10. Under the Department of Commerce rules, ex- Commercial Control List
porters must have an export license for items
and technologies that are on the _________.
11. Under the ____________________, federal agencies E-Government Act of 2002
must 1) review their IT systems for privacy risks;
2) post privacy policies on their Web sites; 3)
post machine-readable privacy policies on their
Web sites; and 4) report privacy activities to the
OMB.
12. What was the first federal law to address feder- Computer Security Act (CSA)
al computer security?
13. Which of the following are types of export con- International Traffic in Arms Regula-
trol regulations? tions (ITAR) & Export Administration
Regulations (EAR)
14. Which of the following is not one of the guide- DoD employees are not permitted to
lines in the DoD's policy on social media? use social media from their personal
devices for personal purposes
15. Which of the following is not one the federal the culture within the federal gov-
information security challenges the federal CIO ernment of not complying with re-
spoke of at a House of Representatives sub- porting requirements
committee meeting in March 2010?