100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

FITSP - Manager Next Generation Questions Newest Actual Exam With Complete Questions And Correct Detailed Answers (Verified Answers) |Already Graded A+

Rating
-
Sold
-
Pages
22
Grade
A+
Uploaded on
08-01-2026
Written in
2025/2026

FITSP - Manager Next Generation Questions Newest Actual Exam With Complete Questions And Correct Detailed Answers (Verified Answers) |Already Graded A+

Institution
FITSP - Manager Next Generation
Module
FITSP - Manager Next Generation










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
FITSP - Manager Next Generation
Module
FITSP - Manager Next Generation

Document information

Uploaded on
January 8, 2026
Number of pages
22
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

FITSP - Manager Next Generation Questions Newest Actual Exam With Complete
Questions And Correct Detailed Answers (Verified Answers) |Already Graded A+


The following legislation requires federal agencies to develop, document and implement an
agency-wide information security program: - (Correct Answer)-FISMA



The following legislation requires each agency with an Inspector General to conduct an annual
evaluation of agency's information security program, or to appoint an independent external
auditor, to conduct the evaluation on their behalf - (Correct Answer)-E-Government Act of 2002,
Section 208



The following OMB guidance established the requirement for federal agencies to review the
security controls in each system when significant modifications are made to the system, or at
least every three years. This guidance also requires federal agencies to re-authorize information
systems every three years - (Correct Answer)-OMB Circular No. A-130, Appendix III, Security
of Federal Automated Information Resources



The Federal Information Security Modernization Act of 2014 (FISMA 2014) formally assigns
information security responsibilities to which of the following agencies/departments (select two):
- (Correct Answer)-DHS and OMB



Current regulations still require the re-authorization of federal information systems at least every
three years. - (Correct Answer)-True



The following OMB guidance established the requirement for federal agencies to review the
security controls in each system when significant modifications are made to the system, but at
least every three years. This guidance also requires federal agencies to re-authorize information
systems every three years. - (Correct Answer)-OMB Circular No. A-130, Appendix III, Security
of Federal Automated Information Resources

, 2




As part of monitoring the security posture of agency desktops, OMB requires federal agencies to
use vulnerability scanning tools that leverage the ________ protocol. - (Correct Answer)-SCAP



Following the loss of 26 million records containing PII at the Department of Veteran Affairs,
OMB released M-06-16 Protection of Sensitive Agency Information. This memo required all of
the following EXCEPT: - (Correct Answer)-Encryption of all server backup tapes



This Homeland Security Presidential Directive requires all federal agencies to adopt a standard,
government wide card to reduce identity fraud, protect personal privacy, and provide for
authentication. This directive was called: - (Correct Answer)-HSPD-12 - Common Identification
Standard



Current regulations still require the re-authorization of federal information systems at least every
three years. - (Correct Answer)-True



What elements are components of an information system? - (Correct Answer)-Hardware and
software, Interconnected systems, People



What is the main consideration in determining the scope of authorization for information
systems? - (Correct Answer)-System Boundaries



Which approach involves continually balancing the protection of agency information and assets
with the cost of security controls and mitigation strategies? - (Correct Answer)-Risk
Management Approach

, 3




What establishes the scope of protection for organizational information systems? - (Correct
Answer)-System Boundaries



List the 7 steps of the RMF process? - (Correct Answer)-Prepare, Categorize, Select, Implement,
Assess, Authorize, Monitor



During what phase of the SDLC should the organization consider the security requirements? -
(Correct Answer)-Initiation Phase / Development / Acquisition Phase



Security Reauthorizations are conducted during which phase of the SDLC? - (Correct Answer)-
Operations/Maintenance



What NIST Special Publication superseded the original Special Publication 800-30 as the
primary source for guidance on risk management? - (Correct Answer)-SP 800-39



Applying the first three steps in the RMF to legacy systems can be viewed as a
____________________________ to determine if the necessary and sufficient security controls
have been appropriately selected and allocated. - (Correct Answer)-Gap Analysis



Which of the following is not a key document to be updated as part of ISCM? - (Correct
Answer)-SCAP



Security status reporting is: - (Correct Answer)-Event driven, Time driven

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
DoctorGriffin Maryland University
Follow You need to be logged in order to follow users or courses
Sold
2739
Member since
5 months
Number of followers
17
Documents
1307
Last sold
13 hours ago

4.9

183 reviews

5
167
4
15
3
0
2
0
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions