1|Page
FITSP - MANAGER NEXT GENERATION QUESTIONS
NEW 2026 2027 ACTUAL EXAM WITH COMPLETE
QUESTIONS AND ANSWERS, EXAMS OF NURSING
What does the Computer Security Act - 1987 assign, require and mandate. - - ANS✔️--Assigned
NIST formerly know as National Bureau of Standards) to develop standard of minumum
acceptable practices with help of the NSA
Required the establishment of security policies of Federal computer system that contain sensitive
information
Mandated security awareness training for Federal employees that use those systems
What's another name for the Information Technology Managment Reform Act - 1996? - -
ANS✔️--Clinger-Cohen Act
What did the Clinger-Cohen Act do? - - ANS✔️--Implemented the Capital Planning Investment
Control (CPIC) IT budget planning process
Granted OMB authority to oversee the acquisition,use,and disposal of IT by the Federal
Goverment
Established CIO positions in every department and agency in the Federal Goverment
,2|Page
Established the CIO council with 28 major agencies and OMB
Defined and IT architecture (ITA) for evolving and acquiring IT
What is the "at risk" category under Clinger-Cohen act supported by OMB? - - ANS✔️--OMB
grades IT projects and funds accordingly - the "at risk" category indicates. "This risk of not
receiving initial or continued funding for the project.
What was the first official public declaration of what constitues a National Security System? - -
ANS✔️--Clinger-Cohen Act (CCA)
According to the CCA, what is considered a National Security System (NSS)? - - ANS✔️--If the
system in involved the following
Involves intelligence activities
Involves cryptologic activities related to national security
Involves command and controls of military forces
Involves equipment that is an integral part of a weapon or weapons system
Is critical to the direct fulfillment of milatary or intelligence mission
What is Goverment Information Security Reform Act (GISRA) 2000 - - ANS✔️--The
Government Information Security Reform Act (formerly known as the Thompson-Liebermann
Act) is a federal law that required U.S. government agencies to implement an information
security program that includes planning, assessment and protection. It was enacted in 2000 and
replaced by the Federal Information Security Management Act (FISMA) in 2002
,3|Page
What is a National Security Letter? - - ANS✔️--An NSL is a demand letter issued to a particular
entity or organization to turn over various records and data pertaining to individuals.
What is the USA Patriot Act full title? - - ANS✔️--The USA PATRIOT Act is an Act of
Congress that was signed into law by President George W. Bush on October 26, 2001.[1] With
its ten-letter abbreviation (USA PATRIOT) expanded, the full title is "Uniting and Strengthening
America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of
2001".
What does E-Goverment Act of 2002 accomplish? - - ANS✔️--Establish a Federal CIO within
OMB
Areas of E-Gov:
-Capital planning and investment control for information technology
-Development of enterprise architectures (FEA)
-Information Security (Title III) - aka FISMA
-Access to goverment infomation
Establish CIO counsel in the Executive Branch
What is FISMA? - - ANS✔️--Title III of E-Gov Act 2002
Requires each federal agency to implement an information security program
Reports annually to OMB on:
-Adequacy of security program
, 4|Page
-Adequacy of plans and reports relating to annual budgets
-Significant deficiency
Continuously evolving
What is HITECH? - - ANS✔️--The Health Information Technology for Economic and Clinical
Health Act (HITECH Act) mandates audits of health care providers to investigate and determine
if they are in compliance with the HIPAA Privacy Rule (effective in 2003) and Security Rule
(effective in 2005). It's part of ARRA in 2009.
What is COPPA? - - ANS✔️--The Children's Online Privacy Protection Act (COPPA) is a law
created to protect the privacy of children under 13. The Act was passed by the U.S. Congress in
1998 and took effect in April 2000. COPPA is managed by the Federal Trade Commission
(FTC).
What is the Economic Espionage Act (EEA) 1998 - - ANS✔️--The Economic Espionage Act of
1996 (EEA), 18 U.S.C. §§ 1831-1839, defines the term "economic espionage" as the theft or
misappropriation of a trade secret with the intent or knowledge that the offense will benefit any
foreign government, foreign instrumentality, or foreign agent.
What is the purpose Office of Management and Budget Circular A-11 - - ANS✔️--Preparation,
Submission and Execution of the Budget, June 2008.
FITSP - MANAGER NEXT GENERATION QUESTIONS
NEW 2026 2027 ACTUAL EXAM WITH COMPLETE
QUESTIONS AND ANSWERS, EXAMS OF NURSING
What does the Computer Security Act - 1987 assign, require and mandate. - - ANS✔️--Assigned
NIST formerly know as National Bureau of Standards) to develop standard of minumum
acceptable practices with help of the NSA
Required the establishment of security policies of Federal computer system that contain sensitive
information
Mandated security awareness training for Federal employees that use those systems
What's another name for the Information Technology Managment Reform Act - 1996? - -
ANS✔️--Clinger-Cohen Act
What did the Clinger-Cohen Act do? - - ANS✔️--Implemented the Capital Planning Investment
Control (CPIC) IT budget planning process
Granted OMB authority to oversee the acquisition,use,and disposal of IT by the Federal
Goverment
Established CIO positions in every department and agency in the Federal Goverment
,2|Page
Established the CIO council with 28 major agencies and OMB
Defined and IT architecture (ITA) for evolving and acquiring IT
What is the "at risk" category under Clinger-Cohen act supported by OMB? - - ANS✔️--OMB
grades IT projects and funds accordingly - the "at risk" category indicates. "This risk of not
receiving initial or continued funding for the project.
What was the first official public declaration of what constitues a National Security System? - -
ANS✔️--Clinger-Cohen Act (CCA)
According to the CCA, what is considered a National Security System (NSS)? - - ANS✔️--If the
system in involved the following
Involves intelligence activities
Involves cryptologic activities related to national security
Involves command and controls of military forces
Involves equipment that is an integral part of a weapon or weapons system
Is critical to the direct fulfillment of milatary or intelligence mission
What is Goverment Information Security Reform Act (GISRA) 2000 - - ANS✔️--The
Government Information Security Reform Act (formerly known as the Thompson-Liebermann
Act) is a federal law that required U.S. government agencies to implement an information
security program that includes planning, assessment and protection. It was enacted in 2000 and
replaced by the Federal Information Security Management Act (FISMA) in 2002
,3|Page
What is a National Security Letter? - - ANS✔️--An NSL is a demand letter issued to a particular
entity or organization to turn over various records and data pertaining to individuals.
What is the USA Patriot Act full title? - - ANS✔️--The USA PATRIOT Act is an Act of
Congress that was signed into law by President George W. Bush on October 26, 2001.[1] With
its ten-letter abbreviation (USA PATRIOT) expanded, the full title is "Uniting and Strengthening
America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of
2001".
What does E-Goverment Act of 2002 accomplish? - - ANS✔️--Establish a Federal CIO within
OMB
Areas of E-Gov:
-Capital planning and investment control for information technology
-Development of enterprise architectures (FEA)
-Information Security (Title III) - aka FISMA
-Access to goverment infomation
Establish CIO counsel in the Executive Branch
What is FISMA? - - ANS✔️--Title III of E-Gov Act 2002
Requires each federal agency to implement an information security program
Reports annually to OMB on:
-Adequacy of security program
, 4|Page
-Adequacy of plans and reports relating to annual budgets
-Significant deficiency
Continuously evolving
What is HITECH? - - ANS✔️--The Health Information Technology for Economic and Clinical
Health Act (HITECH Act) mandates audits of health care providers to investigate and determine
if they are in compliance with the HIPAA Privacy Rule (effective in 2003) and Security Rule
(effective in 2005). It's part of ARRA in 2009.
What is COPPA? - - ANS✔️--The Children's Online Privacy Protection Act (COPPA) is a law
created to protect the privacy of children under 13. The Act was passed by the U.S. Congress in
1998 and took effect in April 2000. COPPA is managed by the Federal Trade Commission
(FTC).
What is the Economic Espionage Act (EEA) 1998 - - ANS✔️--The Economic Espionage Act of
1996 (EEA), 18 U.S.C. §§ 1831-1839, defines the term "economic espionage" as the theft or
misappropriation of a trade secret with the intent or knowledge that the offense will benefit any
foreign government, foreign instrumentality, or foreign agent.
What is the purpose Office of Management and Budget Circular A-11 - - ANS✔️--Preparation,
Submission and Execution of the Budget, June 2008.