100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

ISC2 CAP Exam Prep Questions with 100% Correct Answers 2024

Rating
-
Sold
-
Pages
24
Grade
A+
Uploaded on
13-04-2024
Written in
2023/2024

ISC2 CAP Exam Prep Questions with 100% Correct Answers 2024 In FIPS 199, a loss of Confidentiality is defined as - answerThe unauthorized disclosure of information In FIPS 199, a loss of Integrity is defined as - answerThe unauthorized modification or destruction of information In FIPS 199, a loss of Availability is defined as - answerThe disruption of access to or use of information NIST Special Publication 800-53 r4 - answerFIPS 200 Mandated - A catalog of security controls. Defines three baselines (L, M, H). Initial version published in 2005. None - answerThis FIPS document can be waived Inherited - answerAn organizations information systems are a mix of Windows and UNIX systems located in a single computer room. Access to the computer room is restricted by the door locks that require proximity cards and personal identification numbers (PINS). Only a small percentage of the organizations employees have access to the computer room. The computer room access restriction is an example of what type of security control relative to the hardware in the computer room? Supplement the common controls with system-specific or hybrid controls to achieve the required protection for the system - answerAn information system is currently in the initiation phase of the SDLC and has been categorized high impact. The information system owner wants to inherit common controls provided by another organization information system that is categorized moderate impact.. How does the information system owner ensure that the common controls will provide adequate protection for the information system? Active involvement by authorizing officials in the ongoing management of information system- related security risks. - answerAn effective security control monitoring strategy for an information system includes... All Steps - answerIn which steps is the security plan updated (Categorize, Implement, or Monitor) An enterprise security authorization program is considered successful when - answerA) provides an effective means of meeting requirements B) permits efficient oversight of its activities C) provides assurance that controls are implemented at the system level Hybrid - answerA large organization has a documented information system policy that has been reviewed and approved by senior officials and is readily available to all organizational staff. This information security policy explicitly addresses each of the 17 control families in NIST SP 800-53, Revision.3. Some system owners also established procedures for the technical class of security controls on certain of their systems. In their respective system security plans, control AC-1 Access Control Policy and Procedures (a technical class security control) must be identified as what type of control? NIST Special Publication 800-37, Revision 1 - answerThis manual defines the RIsk Management Framework NIST Special Publication 800-30 - answerThis manual defines how to conduct a risk assessment FISMA - answerFederal Information Security Management Act Federal Information Security Management Act (FISMA) - answerThis raised visibility through government on certification, accreditation and system authorizations and follows NIST SP 800- 37 SDLC phases within the RMF in order - answer1) Initiation 2) Development/Acquisition 3) Implementation 4) Operation/Maintenance 5) Disposal Information System Owner (ISO) - answerThis organizational official is responsible for the procurement, development, integration, modification, operation, maintenance, and disposal of an information system. FIPS 200 - answerThis document specifies security requirements for federal information and information systems in 17 security-related areas that represent a broad-based, balanced information security program. Specifies that a minimum baseline of security controls, as defined in NIST SP 800-53, will be implemented. Specifies that the baselines are to be appropriately tailored. Leveraged - answerWhich authorization approach (leveraged, single, and joint or site specific) considers time elapsed since the authorization results were produced, the environment of operation, the criticality/sensitivity of the information, and the risk tolerance of other organizations? Authorizing Official (AO) - answerWhen an authorization to operation (ATO) is issued, this role authoritatively accepts residual risk on behalf of the organization. Information Technology Systems - answerThe objective of system authorization is to ensure the security of... Will NEVER have a primary role in any RMF step tasks - answerA) Information system security officer (ISSO) B) Information system security engineer (ISSE) Authorizing Official (AO) - answerWho does the Security Control Assessor (SCA) report directly to? Independence and Technical Confidence - answerThe two basic traits a Security Control Assessor (SCA) must have Successful information technology develops separate security perimeters covering individual critical resources according to the system boundaries rather than one perimeter to cover all critical resources. This works because... - answerA) Systems are distance B) Their limits can be defined in practical terms C) Security is comparatively easy to implement at system level Authorizing Official (AO) - answerThe Information System Owner (ISO) is appointed by this person Chief Information Officer (CIO) - answerThe Common Control Provider (CCP) is appointed by this person Certification - answerThe process to assess effectiveness of security controls NIST Special Publication 800-53, Revision 4 - answerThis publication introduces the new family Program Management as well as eight additional security and privacy control families to the FIPS 200 17 security control families. The three Risk Management core components - answerA) Risk Assessment (understand what can go wrong) B) Risk Mitigation (identify how risk is managed)

Show more Read less
Institution
ISC2 CAP
Module
ISC2 CAP










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ISC2 CAP
Module
ISC2 CAP

Document information

Uploaded on
April 13, 2024
Number of pages
24
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Fyndlay Kaplan University
Follow You need to be logged in order to follow users or courses
Sold
351
Member since
1 year
Number of followers
80
Documents
18286
Last sold
3 hours ago
Scholar\'s Sanctuary.

Explore a Vast Collection of Finely Made Learning Materials.

3.7

67 reviews

5
31
4
8
3
13
2
6
1
9

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions