A+ 2025/2026 UPDATED NEW!!
ISCM strategy at this level is focused on ensuring that all system-level security controls are
implemented correctly, operate as intended, produce the desired outcome with respect to
mee ng the security requirements for the system, and con nue to be effec ve over me. - Ans
Tier 3
Which of the following are security-focused configura on management (SecCM) roles in risk
management? - Ans A.) Ensuring that adjustments to the system configura on do not adversely
affect the security of the informa on system B.) Establishing configura on baselines and
tracking, controlling, and managing aspects of business development C.) Ensuring that
adjustments to the system configura on do not adversely affect the organiza ons opera ons
This security Configura on Management (CM) control includes physical and logical access
controls and prevents the installa on of so.ware and firmware unless verified with an approved
cer ficate. - Ans Access Restric ons for Change
This security Configura on Management (CM) control ensures that so.ware use complies with
contract agreements and copyright laws, tracks usage, and is not used for unauthorized
distribu on, display, performance, or reproduc on. - Ans So.ware Usage Restric ons
This security Configura on Management (CM) control involves the systema c proposal,
jus fica on, implementa on, tes ng, review, and disposi on of changes to the systems,
including system upgrades and modifica ons. - Ans Configura on Change Control
This security Configura on Management (CM) control applies to the parameters that can be
changed in hardware, so.ware, or firmware components that affect the security posture and/or
fun onality of the system, including registry se2ngs, account/directory permission se2ng, and
se2ngs for func ons, ports and protocols. - Ans Configura on Se2ngs
, Which of the following describes the role of the Na onal Industrial Security Program (NISP) in
con nuous monitoring? - Ans The NISP ensures that monitoring requirements, restric ons, and
safeguards that industry must follow are in place before any classified work may begin.
Which of the following describes the rela onship between configura on management controls
and con nuous monitoring? - Ans Implemen ng informa on system changes almost always
results in some adjustment to the system configura on that requires con nuous monitoring of
security controls.
Which of the following is a role of risk management in con nuous monitoring? - Ans Risk
management in con nuous monitoring ensures that informa on security solu ons are broad-
based, consensus-driven, and address the ongoing needs of and risks to the government and
industry.
Select ALL the correct responses. Which of the following describe con nuous monitoring
capabili es for detec ng threats and mi ga ng vulnerabili es? - Ans A.) Conduc ng frequent
audits B.) Not relying on firewalls to protect against all a6acks
Which of the following describes how the Informa on System Con nuous Monitoring (ISCM)
strategy supports the Tier 2 MISSION/BUSINESS PROCESSES approach to risk management? -
Ans Tier 2 ISCM strategies focus on the controls that address the establishment and
management of the organiza on's informa on security program, including establishing the
minimum frequency with which each security control or metric is to be assessed or monitored.
Which of the following is an example of how counterintelligence and cybersecurity personnel
support con nuous monitoring? - Ans Through aggrega on and analysis of Suspicious Network
Ac vity via cyber intrusion, viruses, malware, backdoor a6acks, acquisi on of user names and
passwords, and similar targe ng, the DSS CI Directorate produces and disseminates reports on
trends in cybera6acks and espionage.
, Which of the following describes how audit logs support con nuous monitoring? - Ans Security
audi ng is a fundamental ac vity in con nuous monitoring in order to determine what ac vi es
occurred and which user or process was responsible for them on an informa on system.
Which of the following iden fies how the Risk Management Framework (RMF) supports risk
management? - Ans The RMF process emphasizes con nuous monitoring and mely correc on
of deficiencies.
Select ALL the correct responses. Which of the following are key informa on provided in a
security audit trail analysis? - Ans A.) Unsuccessful accesses to security-relevant objects and
directories B.) Successful and unsuccessful logons/logoffs C.) Denial of access for excessive
logon a6empts
Which of the following fundamental concepts does con nuous monitoring support that means
DoD informa on technology is managed to minimize shared risk by ensuring the security
posture of one system is not undermined by vulnerabili es of interconnected systems? - Ans
Interoperability and opera onal reciprocity
Which of the following ensures that a process is in place for authorized users to report all
cybersecurity-related events and poten al threats and vulnerabili es and ini ates protec ve or
correc ve measures when a cybersecurity incident or vulnerability is discovered? - Ans
Informa on System Security Officer
Which of the following are the ini al steps for finding the Security Event Log on a computer
running Windows 7? - Ans Select Control Panel from the Windows Start menu and then select
the System and Security link
During which of the following Risk Management Framework steps does con nuous monitoring
take place? - Ans Step 6, monitor the security controls