Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

RMF CHAPTER 8: STEP 4 ASSESS WITH COMPLETE SOLUTIONS

Beoordeling
-
Verkocht
-
Pagina's
7
Cijfer
A+
Geüpload op
26-04-2025
Geschreven in
2024/2025

FIPS 200/NIST SP 800-53 (Specification of Security Controls) NIST SP 800-53A (Assessment of Security Control Effectiveness) - ANSWER-When Assessing Security Controls, agencies are required to follow what publication for the specification of security controls; and what publication for the assessment of security control effectiveness? Satisfactory or Other - ANSWER-An assessment can be either ____________ or ____________; nothing else. Compliant or Non-compliant - ANSWER-An assessment can be deemed Satisfactory or Other. The DoD uses a different set of terms, what are they? - Scope - Method - Depth - Breath - ANSWER-What are the critical factors in assessments? - Prepare for security control assessment. - Establish security control assessment plan. - Determine security control effectiveness. - Develop initial security assessment report. - Perform initial remediation actions.

Meer zien Lees minder
Instelling
RMF CHAPTER 8: STEP 4 ASSESS
Vak
RMF CHAPTER 8: STEP 4 ASSESS

Voorbeeld van de inhoud

RMF CHAPTER 8: STEP 4 ASSESS WITH
COMPLETE SOLUTIONS
FIPS 200/NIST SP 800-53 (Specification of Security Controls)

NIST SP 800-53A (Assessment of Security Control Effectiveness) - ANSWER-When
Assessing Security Controls, agencies are required to follow what publication for the
specification of security controls; and what publication for the assessment of security
control effectiveness?

Satisfactory or Other - ANSWER-An assessment can be either ____________ or
____________; nothing else.

Compliant or Non-compliant - ANSWER-An assessment can be deemed Satisfactory or
Other. The DoD uses a different set of terms, what are they?

- Scope
- Method
- Depth
- Breath - ANSWER-What are the critical factors in assessments?

- Prepare for security control assessment.
- Establish security control assessment plan.
- Determine security control effectiveness.
- Develop initial security assessment report.
- Perform initial remediation actions.
- Develop final security assessment report and addendum. - ANSWER-What are the 6
key areas for Assessment?

Security Assessment Plan - ANSWER-What defines methods and procedures for
testing, evaluating, and assessing various security controls in a system; includes Rules
of Engagement (ROE) document?

Rules of Engagement (ROE) document - ANSWER-What is a document that provides
oversight and approval for assessment and internal & external testing, including
penetration testing?

NIST SP 800-115 - ANSWER-Organizations should develop a Security Assessment
Plan as provided for in what publication?

1. Develop a Security Assessment Policy
2. Prioritize and Schedule Assessment
3. Select and Customize Techniques

, 4. Determine Logistics of Assessment
5. Develop the Assessment Plan
6. Address Legal Considerations - ANSWER-As provided by NIST Special Publication
800-115, NIST lays out recommendations for developing an Assessment plan. What are
the recommendations?

- Organizational requirements with which assessments must comply.
- Appropriate roles and responsibilities (at a minimum, for those individuals approving
and executing assessments).
- Adherence to established methodology.
- Assessment frequency.
- Documentation requirements, such as assessment plans and assessment results. -
ANSWER-What should the Security Assessment Policy in the Security Assessment
Plan address when developing it?

- What systems should undergo assessments.
- How often assessments should be done. - ANSWER-What should the Prioritize and
Schedule Assessment in the Security Assessment Plan address?

- System categorization
- Expected benefits
- Scheduling requirements
- When required by law or regulation
- Resource availability - ANSWER-When Prioritizing and Scheduling assessments,
prioritization should be based on what?

- An organization should first determine its assessment objectives (such as verifying
compliance, verifying system's security as part of C&A activities, identifying exploitable
vulnerabilities, or evaluating Intrusion Detection Systems).

- The organization should select the classes of techniques (e.g., review, target
identification and analysis, target vulnerability validation) to be used to obtain
information that supports those objectives, and specific techniques within each selected
class.

- Resources and skill available.
- Consider risk involved in selecting techniques. - ANSWER-What should the Select and
Customize Techniques in the Security Assessment Plan address?

- Identifying all required resources, including the assessment team.
- Selecting environments and locations from which to perform the assessment.
- Acquiring and configuring all necessary technical tools. - ANSWER-What should the
Determine Logistics of Assessment in the Security Assessment Plan address?

- Documents the activities planned for an assessment and other related information.
- To provide the rules and boundaries to which assessors must adhere.

Geschreven voor

Instelling
RMF CHAPTER 8: STEP 4 ASSESS
Vak
RMF CHAPTER 8: STEP 4 ASSESS

Documentinformatie

Geüpload op
26 april 2025
Aantal pagina's
7
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$18.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kan je een ander document kiezen. Je kan het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Thumbnail
Voordeelbundel
RISK MANAGEMENT FRAMEWORK(RMF) EXAM PACKAGE DEAL- COMPLETE BUNDLE PACK!!
-
21 2025
$ 386.29 Meer info

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
NursingTutor1 West Virginia University
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
1673
Lid sinds
3 jaar
Aantal volgers
1073
Documenten
18137
Laatst verkocht
1 week geleden
Nursing Tutor

Paper Due? Worry not. Hello. Welcome to NursingTutor. Here you\'ll find verified study materials for your assignments, exams and general school work. All papers here are graded A to help you get the best grade. Also, I am a friendly person so, do not hesitate to send a message in case you have a query. I wish you Luck.

3.9

455 beoordelingen

5
215
4
78
3
91
2
21
1
50

Populaire documenten

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen