Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Isc2 Cap Practice Test Questions: |1-50 Questions with 100% Correct Answers | Verified | Updated 2024.

Beoordeling
-
Verkocht
-
Pagina's
10
Cijfer
A+
Geüpload op
27-03-2024
Geschreven in
2023/2024

Isc2 Cap Practice Test Questions: |1-50 Questions with 100% Correct Answers | Verified | Updated 2024. 1. Continuously observing and evaluating the information system security controls during the system life cycle to determine whether changes have occurred that will negatively impact the system security" best describes which process in the certification and accreditation methodology? a. Continuous monitoring b. Continuous improvement c. Continuous management d. Continuous development Continuous monitoring 2. Which one of the following activities is not a component of the continuous monitoring process? a. Operation and maintenance b. Security control monitoring and impact analyses c. Status reporting and documentation d. Configuration management and control Operation and maintenance 3. Which one of the following publications provides details of the continuous monitoring process? a. NIST SP 800-14 b. NIST SP 800-42 c. NIST SP 800-37 d. NIST SP 800-41 NIST SP 800-37 4. Which one of the following best describes when continuous monitoring takes place? a. Before the initial system certification b. After the initial system security accreditation c. Before and after the initial system security accreditation d. During the system design phase After the initial system security accreditation 5. Which one of the following questions is not asked as part of the continuous monitoring process? a. Could any of the changes to the information system affect the current, identified vulnerabilities in the system or introduce new vulnerabilities into the system? b. if new vulnerabilities are introduced into an information system, would the resulting risk to agency operations, agency assets, or individuals be unacceptable? c. What maintenance schedule should be followed during the operation/maintenance phase of the information system? d. When will the information system need to be reaccredited in accordance with federal or agency policy? What maintenance schedule should be followed during the operation/maintenance phase of the information system? 6. In configuration management and control, if necessary, updates have to be made to which of the following documents? a. System security plan b. System security plan and plan of action and milestones c. Plan of action and milestones d. System deficiency report and plan of action and milestones System security plan and plan of action and milestones 7. Which one of the following documents should report progress made on the current outstanding items and address vulnerabilities in the information system discovered during the security impact analysis or security control monitoring? a. Plan of action and milestones b. System security plan c. System security plan and plan of action and milestones d. System deficiency plan Plan of action and milestones 8. What process should be initiated when changes to the information system negatively impact the security of the system or when a period of time has elapsed as specified by agency or federal policy? a. Incident response b. Systems engineering c. Reaccreditation d. Reclassification of data Reaccreditation 9. What course of action is recommended when it is not feasible or possible to continuously monitor the entirety of security controls in an information system? a. Begin the reaccreditation process b. Begin the recertification process c. Enter the system development life cycle (SDLC) d. Select subsets of controls and monitor them at intervals Select subsets of controls and monitor them at intervals 10.Selecting controls to be monitored can be best aided by what document? a. FIPS 199 b. NIST SP 800-37 c. FISMA d. NIST SP 800-18 FIPS 199 11.What document provides a standard approach to the assessment of NIST SP 800-53 security controls? a. FIPS 199 b. NIST SP 800-53A c. NIST SP 800-30 d. NIST SP 800-66 NIST SP 800-53A 12.Appendix D of NIST SP 800-53A describes what three basic types of assessment methods? a. The interview, the examination, and testing b. The interview, the validation, and testing c. The interview, the examination, and remediation d. The interview, the verification, and testing The interview, the examination, and testing 13.NIST SP 800-53A defines which of the following three types of interviews, depending on the level of assessment conducted? a. Initial, substantial, comprehensive b. Abbreviated, substantial, comprehensive c. Abbreviated, moderate, comprehensive d. Abbreviated, substantial, detailed Abbreviated, substantial, comprehensive 14.What NIST SP 800-53A assessment method is used to review, inspect, and analyze assessment objects such as polices, plans, requirements, designs, hardware, firmware, and security activities to determine the effectiveness of information system security controls? a. Verification b. Interview c. Examination d. Validation Examination 15.Observing or conducting the operation of physical devices, hardware, software, and firmware and determining whether they exhibit the desired and expected behavior describes what type of SP 800-53A assessment method? a. Examination b. Testing c. Validation d. Remediation Testing

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

Isc2 Cap Practice Test Questions: |1-50
Questions with 100% Correct Answers |
Verified | Updated 2024.
1. Continuously observing and evaluating the information system security controls during the system
life cycle to determine whether changes have occurred that will negatively impact the system security"
best describes which process in the certification and accreditation methodology?
a. Continuous monitoring
b. Continuous improvement
c. Continuous management
d. Continuous development

Continuous monitoring

2. Which one of the following activities is not a component of the continuous monitoring process?
a. Operation and maintenance
b. Security control monitoring and impact analyses
c. Status reporting and documentation
d. Configuration management and control

Operation and maintenance

3. Which one of the following publications provides details of the continuous monitoring process?
a. NIST SP 800-14
b. NIST SP 800-42
c. NIST SP 800-37
d. NIST SP 800-41

NIST SP 800-37

4. Which one of the following best describes when continuous monitoring takes place?
a. Before the initial system certification
b. After the initial system security accreditation
c. Before and after the initial system security accreditation
d. During the system design phase

After the initial system security accreditation

5. Which one of the following questions is not asked as part of the continuous monitoring process?
a. Could any of the changes to the information system affect the current, identified vulnerabilities in
the system or introduce new vulnerabilities into the system?
b. if new vulnerabilities are introduced into an information system, would the resulting risk to agency
operations, agency assets, or individuals be unacceptable?
c. What maintenance schedule should be followed during the operation/maintenance phase of the

, information system?
d. When will the information system need to be reaccredited in accordance with federal or agency
policy?

What maintenance schedule should be followed during the operation/maintenance phase of the
information system?

6. In configuration management and control, if necessary, updates have to be made to which of the
following documents?
a. System security plan
b. System security plan and plan of action and milestones
c. Plan of action and milestones
d. System deficiency report and plan of action and milestones

System security plan and plan of action and milestones

7. Which one of the following documents should report progress made on the current outstanding
items and address vulnerabilities in the information system discovered during the security impact
analysis or security control monitoring?
a. Plan of action and milestones
b. System security plan
c. System security plan and plan of action and milestones
d. System deficiency plan

Plan of action and milestones

8. What process should be initiated when changes to the information system negatively impact the
security of the system or when a period of time has elapsed as specified by agency or federal policy?
a. Incident response
b. Systems engineering
c. Reaccreditation
d. Reclassification of data

Reaccreditation

9. What course of action is recommended when it is not feasible or possible to continuously monitor
the entirety of security controls in an information system?
a. Begin the reaccreditation process
b. Begin the recertification process
c. Enter the system development life cycle (SDLC)
d. Select subsets of controls and monitor them at intervals

Select subsets of controls and monitor them at intervals

10.Selecting controls to be monitored can be best aided by what document?
a. FIPS 199
b. NIST SP 800-37
c. FISMA
d. NIST SP 800-18

Geschreven voor

Vak

Documentinformatie

Geüpload op
27 maart 2024
Aantal pagina's
10
Geschreven in
2023/2024
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$13.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
ACADEMICSTORE Chamberlain College Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
25
Lid sinds
2 jaar
Aantal volgers
14
Documenten
1293
Laatst verkocht
1 jaar geleden
ACADEMIC STORE

Expert Study Solutions | Nursing, Business, Accounting & More! Looking for top-quality study materials to excel in college or university? You're in the right place! I provide highly graded, almost A+ solutions across various subjects, including Nursing (my main expertise), Business, Accounting, Statistics, Chemistry, Biology, and many more. ✅ Accurate & Well-Researched Guides ✅ Comprehensive Solutions for Better Grades ✅ Student-Friendly Approach & Full Support ✅ Satisfaction Guaranteed – Refund Available if Not Satisfied I’m committed to helping students succeed by providing reliable, high-quality academic resources. Let’s boost your grades together!

Lees meer Lees minder
5.0

3 beoordelingen

5
3
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen