Questions And Correct Detailed Answers (Verified Answers)
|Already Graded A+
The following legislation requires federal agencies to establish capital
planning and investment control policies and procedures when
procuring information technology:
a) E-Government Act of 2002
b) Federal Information Security Management Act (FISMA)
c) Government Information Security Reform Act (GISRA)
d) Clinger-Cohen Act - ANSWERS--Clinger-Cohen Act
The following legislation requires federal agencies to appoint a Chief
Information Officer:
a) E-Government Act of 2002
b) Federal Information Security Management Act (FISMA)
c) Government Information Security Reform Act (GISRA)
d) Clinger-Cohen Act - ANSWERS--Clinger-Cohen Act
The following legislation requires federal agencies to develop,
document, and implement an agency-wide information security
program:
a) E-Government Act of 2002, Section 208
b) Federal Information Security Management Act (FISMA)
c) Government Information Security Reform Act (GISRA)
,d) Clinger-Cohen Act - ANSWERS--Federal Information Security
Management Act (FISMA)
The following legislation requires federal agencies to prepare Privacy
Impact Assessments (PIAs) when developing or procuring new
information technology:
a) E-Government Act of 2002, Section 208
b) Federal Information Security Management Act (FISMA)
c) Privacy Act, 1974
d) Clinger-Cohen Act - ANSWERS--E-Government Act of 2002, Section
208
The following legislation requires each agency with an Inspector
General to conduct an annual evaluation of agency's information
security program, or to appoint an
independent external auditor, to conduct the evaluation on their
behalf:
a) E-Government Act of 2002, Title I
b) Federal Information Security Management Act (FISMA)
c) Government Information Security Reform Act (GISRA)
d) Clinger-Cohen Act - ANSWERS--Federal Information Security
Management Act (FISMA)
The following OMB guidance established the requirement for federal
agencies to review the security controls in each system when
significant modifications are made to
,the system, or at least every three years. This guidance also requires
federal agencies to re-authorize information systems every three
years.
a) OMB Circular No. A-123- Management Accountability and Control
b) OMB Circular No. A-130, Appendix III, Security of Federal
Automated Information Resources
c) OMB Circular No. A-127, Financial Management Systems
d) OMB Circular No. A-136, Financial Management Reporting
Requirements - ANSWERS--OMB Circular No. A-130, Appendix III,
Security of Federal Automated Information Resources
The Federal Information Security Modernization Act of 2014 (FISMA
2014) formally assigns information security responsibilities to which
of the following agencies/departments (select two):
a) Commerce
b) DHS
c) Justice
d) OMB - ANSWERS--DHS and OMB
What is the required frequency of FISMA reporting feeds for CFO Act
agencies?
a) Monthly
b) Quarterly
c) Semi-annually
d) Annually - ANSWERS--Monthly
, Which law directed the Secretary of Health and Human Services to
develop standards for protecting electronic health information?
a) AARA
b) HITECH
c) HIPAA
d) ePHI - ANSWERS--HIPAA
Current regulations still require the re-authorization of Federal
information systems at least every three years.
a) True
b) False - ANSWERS--False
As part of monitoring the security posture of agency desktops, OMB
requires Federal agencies to
use vulnerability scanning tools that leverage the protocol.
a) SNMP
b) SMTP
c) SCAP
d) LDAP - ANSWERS--SCAP
Following the loss of 26 million records containing Pll at the
Department of Veteran Affairs, OMB released M-06-16 Protection of
Sensitive Agency Information. This memo required all of the
following except:
a) Encryption of all data on mobile computers/devices