ACTUAL CORRECT QUESTIONS AND
VERIFIED DETAILED ANSWERS
|CURRENTLY TESTING QUESTIONS AND
SOLUTIONS|ALREADY GRADED
A+|NEWEST|JUST RELEASED!!|GUARANTEED
PASS
Where are security controls documented?
a) System Security Plan
b) Risk Assessment
c) Business Impact Assessment
d) Privacy Impact Assessment
System Security Plan
What is the correct order of the Risk Management Framework process?
a) Categorize, Select, Implement, Assess, Authorize, Monitor
b) Assess , Categorize, Select, Implement, Authorize, Monitor
c) Assess , Categorize, Authorize, Select, Implement, Monitor
d) Select, Assess, Categorize, Authorize, Implement, Monitor
Categorize, Select, Implement, Assess, Authorize, Monitor
After the information and information system security categorization is completed, which
publication specifies the minimum security requirements for the determined security category?
a) SP 800-37
b) FIPS 200
c) SP 800-53
d) SP 800-122
1|Page
,FIPS 200
What are the three levels of potential impact from a security breach?
a) Limited, Serious, Severe
b) None, Some, Much
c) Low, Moderate, High
d) Minimal, Moderate, Significant
Low, Moderate, High
Privacy security requirements are adequately addressed by the standard catalog of security
controls?
a) True
b) False
c) Not Applicable
True
Which of the following is NOT a type of security control?
a) System-specific
b) Hybrid
c) Derived
d) Common
Derived
When would you use a gap analysis in the RMF process?
a) When applying security to an legacy system
b) When there is an "air gap" in the system connection to the network
c) When there is a significant time gap between design and implementation
d) When the Authorizing Official billet is vacant for an extended time
When applying security to an legacy system
2|Page
,Who has the primary responsibility for implementing the security controls specified in the
system security plan?
a) Information Owner
b) Information System Security Officer
c) Information System Owner
d) Authorizing Official
Information System Owner
What is the first step to assigning impact levels for security categorization?
a) Identify Business Impact
b) Identify Information Type
c) Select Provisional Impact
d) Determine Security Objective
Identify Information Type
What are security controls that are inheritable by one or more organizational information
systems?
a) Common Controls
b) Technical Controls
c) Baseline Controls
d) Inherited Controls
Common Controls
What kind of security control is a management, operational, or technical control is employed by
an organization in lieu of a recommended security control?
a) Scoped Control
b) Tailored Control
c) Supplemental Control
d) Compensating Control
Compensating Control
3|Page
, What is the most significant change, regarding security control selection, in the revision of the
SP 800-37?
a) RMF Step 2 Monitoring Strategy
b) RMF Step 6 System Decommissioning
c) CA Task Removal of Risk Determination
d) RMF SSP Emphasis
RMF Step 2 Monitoring Strategy
What is the basis for the identification of information types?
a) Business Reference Model
b) Mission-Specific Function
c) Management Support Category
d) Performance Reference Model
Business Reference Model
What are the factors that drive the level of effort for the selection and implementation of
security controls?
a) Level of Financial Independence
b) System Importance and Criticality
c) Overall Impact Level
d) Business Impact Level
System Importance and Criticality
Which of the following were purposes in introducing overlays in SP 800-53r4? (Mark all that
apply.)
a) Replace outdated security baselines
b) Allow pre-tailoring of security baselines for specific situations
c) Reduce the requirement for ad hoc tailoring
d) Allow the Authorizing Official to pre-approve system operation
4|Page