FedVTE Cyber Risk Management for Technicians Test
Latest 2025
In order to automate host characteristic monitoring you can
compare baselines and snapshots with syslog.
.....ANSWER.....False
The following should be taken into account when accepting the
residual risk inherent in the project. .....ANSWER.....All of the
above
What is the high water mark for an information system?
.....ANSWER.....Highest Potential Impact value assigned to each
Security Objective (AIC) for all Security Categories resident on
the system and the overall classification of the system.
Which of the following describes NetScan Tools Pro?
.....ANSWER.....B. A powerful command line packet analyzer
, Page 2 of 7
C. A tool that provides advanced network trace routing
D. A collection of Internet information gathering and network
troubleshooting utilities
FIPS 200 is: .....ANSWER.....A short document that describes the
minimum security requirements for information and information
systems
Which risk comes from a failure of the controls to properly
mitigate risk? .....ANSWER.....A. Inherent risk
C. Control Risk
D. All of the above
Open Source Security (OSSEC) is what? .....ANSWER.....A host
based security system that monitors for changes