Systems Security Implementation, Verification and Validation
Ask AstroTutor
FITSAF stands for Federal Information Technology Security Assessment Framework. It is a methodology for assessing the security of information systems. Which of the following FITSAF levels shows that the procedures and controls are tested and reviewed
ALevel 4
BLevel 5
CLevel 1
DLevel 2
ELevel 3
0
Question 2
Secure Operations, Change Management and Disposal
0
Question 3
Systems Security Engineering Foundations
0
Question 4
Security Planning and Engineering
0
Question 5
Systems Security Implementation, Verification and Validation
Which of the following is a type of security management for computers and networks in order to identify security breaches
AIPS
BIDS
CASA
DEAP
SIMULATION -
For interactive and self-paced preparation of exam ISSEP, try our practice exams.
Practice exams also include self assessment and reporting features!
Fill in the blank with an appropriate word. _______ has the goal to securely interconnect people and systems independent of time or location.
Which of the following Registration Tasks notifies the DAA, Certifier, and User Representative that the system requires C&A Support
ARegistration Task 4
BRegistration Task 1
CRegistration Task 3
DRegistration Task 2
Which of the following Security Control Assessment Tasks gathers the documentation and supporting materials essential for the assessment of the security controls in the information system
ASecurity Control Assessment Task 4
BSecurity Control Assessment Task 3
CSecurity Control Assessment Task 1
DSecurity Control Assessment Task 2
Question 6
Systems Security Engineering Foundations
0
Question 7
Risk Management
Question 8
Security Planning and Engineering
Question 9
Security Planning and Engineering
Question 10
Systems Security Engineering Foundations
Question 11
Security Planning and Engineering
Question 12
Systems Security Engineering Foundations
Question 13
Secure Operations, Change Management and Disposal
Question 14
Security Planning and Engineering
Question 15
Secure Operations, Change Management and Disposal
Question 16
Security Planning and Engineering
Question 17
Systems Security Implementation, Verification and Validation
Question 18
Secure Operations, Change Management and Disposal
Question 19
Security Planning and Engineering
Question 20
Security Planning and Engineering
Question 21
Security Planning and Engineering
Question 22
Security Planning and Engineering
Question 23
Secure Operations, Change Management and Disposal
Question 24
Security Planning and Engineering
Question 25
Security Planning and Engineering
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ad
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Which of the following types of firewalls increases the security of data packets by remembering the state of connection at the network and the session layers as they pass through the filter
AStateless packet filter firewall
BPIX firewall
CStateful packet filter firewall
DVirtual firewall
Which of the following federal laws is designed to protect computer data from theft
AFederal Information Security Management Act (FISMA)
BComputer Fraud and Abuse Act (CFAA)
CGovernment Information Security Reform Act (GISRA)
DComputer Security Act
Which of the following professionals is responsible for starting the Certification & Accreditation (C&A) process
AAuthorizing Official
BInformation system owner
CChief Information Officer (CIO)
DChief Risk Officer (CRO)
Which of the following security controls is a set of layered security services that address communications and data security problems in the emerging Internet and intranet application space
AInternet Protocol Security (IPSec)
BCommon data security architecture (CDSA)
CFile encryptors
DApplication program interface (API)
Which of the following protocols is used to establish a secure terminal to a remote network device
AWEP
BSMTP
CSSH
DIPSec
Which of the following elements of Registration task 4 defines the system's external interfaces as well as the purpose of each external interface, and the relationship between the interface and the system
ASystem firmware
BSystem software
CSystem interface
DSystem hardware
DoD 8500.2 establishes IA controls for information systems according to the Mission Assurance Categories (MAC) and confidentiality levels. Which of the following MAC levels requires basic integrity and availability
AMAC I
BMAC II
CMAC IV
DMAC III
Part of your change management plan details what should happen in the change control system for your project. Theresa, a junior project manager, asks what the configuration management activities are for scope changes. You tell her that all of the following are valid configuration management activities except for which one
AConfiguration Item Costing
BConfiguration Identification
CConfiguration Verification and Auditing
DConfiguration Status Accounting
Which of the following guidelines is recommended for engineering, protecting, managing, processing, and controlling national security and sensitive (although unclassified) information
AFederal Information Processing Standard (FIPS)
BSpecial Publication (SP)
CNISTIRs (Internal Reports)
DDIACAP by the United States Department of Defense (DoD)
Which of the following professionals plays the role of a monitor and takes part in the organization's configuration management process
AChief Information Officer
BAuthorizing Official
CCommon Control Provider
DSenior Agency Information Security Officer
Which of the following processes culminates in an agreement between key players that a system in its current configuration and operation provides adequate protection controls
ACertification and accreditation (C&A)
BRisk Management
CInformation systems security engineering (ISSE)
DInformation Assurance (IA)
The Phase 4 of DITSCAP C&A is known as Post Accreditation. This phase starts after the system has been accredited in Phase 3. What are the process activities of this phase Each correct answer represents a complete solution. Choose all that apply.
ASecurity operations
BContinue to review and refine the SSAA
CChange management
DCompliance validation
ESystem operations
FMaintenance of the SSAA
Which of the following email lists is written for the technical audiences, and provides weekly summaries of security issues, new vulnerabilities, potential impact, patches and workarounds, as well as the actions recommended to mitigate risk
ACyber Security Tip
BCyber Security Alert
CCyber Security Bulletin
DTechnical Cyber Security Alert
Which of the following tasks obtains the customer agreement in planning the technical effort
ATask 9
BTask 11
CTask 8
DTask 10
Which of the following documents were developed by NIST for conducting Certification & Accreditation (C&A) Each correct answer represents a complete solution.
Choose all that apply.
ANIST Special Publication 800-59
BNIST Special Publication 800-60
CNIST Special Publication 800-37A
DNIST Special Publication 800-37
ENIST Special Publication 800-53
FNIST Special Publication 800-53A
Which of the following elements are described by the functional requirements task Each correct answer represents a complete solution. Choose all that apply.
ACoverage
BAccuracy
CQuality
DQuantity
Which of the following documents is defined as a source document, which is most useful for the ISSE when classifying the needed security functionality
AInformation Protection Policy (IPP)
BIMM
CSystem Security Context
DCONOPS
What are the responsibilities of a system owner Each correct answer represents a complete solution. Choose all that apply.
AIntegrates security considerations into application and system purchasing decisions and development projects.
BEnsures that the necessary security controls are in place.
CEnsures that adequate security is being provided by the necessary controls, password management, remote access controls, operating system configurations, and so on.
DEnsures that the systems are properly assessed for vulnerabilities and must report any to the incident response team and data owner.
Which of the following Registration Tasks sets up the business or operational functional description and system identification
ARegistration Task 2
BRegistration Task 1
CRegistration Task 3
DRegistration Task 4
SIMULATION -
Fill in the blank with an appropriate section name. _________________ is a section of the SEMP template, which specifies the methods and reasoning planned to build the requisite trade-offs between functionality, performance, cost, and risk.